Thank you for the reply!

On Mar 22, 7:00 pm, Robert Relyea <rrel...@redhat.com> wrote:
> Unless there is an authoritative way to bind the cert to a given email
> address, there is no way to use those certs for email. If you want email
> certs to interoperate with people from outside of the infrastructure,
> the only way is to put the email address in the certificate. Otherwise
> you are completely loosing any value for signed and encrypted email.
>
> Within an infrastructure, it's fine to use some other means to mind cert
> to email (like ldap).

Well, actually, using LDAP is exactly our plan, so having email as a
unique ID for a certificate is not critical at all. Besides, I
wouldn't say that not having an email in the certificate makes them
useless for people from the outside of the infrastructure.  What
concerns encryption - the message is already encrypted using the
public key of the recipient, so having an email in the certificate
does not add anything. Signature verification is, of course,
problematic - if a certificate does not contain an email address, the
message can be changed the certificate swapped and the client will
still state that the message is correctly signed. But nevertheless,
the signature that is not binded to the certificate can point to the
identity and affiliation of the sender - in our case the CA performs
identity verification (or from whom the certificate was stolen, if
later it appears that the message was forged). We are aware of the
risks that usage of such certificates introduces, but since the
attachment (sensitive medical data) will be signed with a qualified
signature, S/MIME signature will not be the only way for ensuring
integrity and authenticity.  But what is critical for us is the
confidentiality protection agains the email provider, and we can't use
it in Thunderbird with our certificates :(

> Validating signature? I'm pretty sure if we can't bind the cert to the
> sender's email address, we mark the signature as invalid. If that isn't
> happening it's a bug! (It may be that you have explicitly marked this
> cert as trusted for this email address?)

I've checked it several times and certificates without email address
can be used for signing messages. Thunderbird (as well as outlook and
outlook express) give a warning that states that the signature is
valid but email addresses in the certificate and in the message are
different. As I've already mentioned, the relevant RFCs require that
such certificates should be accepted, so I am not sure if it is a bug.

So, to cut a long story short, I understand your argument, but I also
think that in some scenarios it can make sense to allow usage of
certificates that do not contain email addresses. It could be a switch
in the settings, a setup option or something else (e.g., Outlook
allows it after a minor change in the registry).

Best regards,
Sergei Evdokimov

-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to