On Mar 22, 11:34 pm, Robert Relyea <rrel...@redhat.com> wrote:
> On 03/22/2011 03:09 PM, silent...@gmail.com wrote:
>
>
>
>
>
>
>
> > Thank you for the reply!
>
> > On Mar 22, 7:00 pm, Robert Relyea <rrel...@redhat.com> wrote:
> >> Unless there is an authoritative way to bind the cert to a given email
> >> address, there is no way to use those certs for email. If you want email
> >> certs to interoperate with people from outside of the infrastructure,
> >> the only way is to put the email address in the certificate. Otherwise
> >> you are completely loosing any value for signed and encrypted email.
>
> >> Within an infrastructure, it's fine to use some other means to mind cert
> >> to email (like ldap).
> > Well, actually, using LDAP is exactly our plan, so having email as a
> > unique ID for a certificate is not critical at all. Besides, I
> > wouldn't say that not having an email in the certificate makes them
> > useless for people from the outside of the infrastructure.  What
> > concerns encryption - the message is already encrypted using the
> > public key of the recipient, so having an email in the certificate
> > does not add anything. Signature verification is, of course,
> > problematic - if a certificate does not contain an email address, the
> > message can be changed the certificate swapped and the client will
> > still state that the message is correctly signed. But nevertheless,
> > the signature that is not binded to the certificate can point to the
> > identity and affiliation of the sender - in our case the CA performs
> > identity verification (or from whom the certificate was stolen, if
> > later it appears that the message was forged). We are aware of the
> > risks that usage of such certificates introduces, but since the
> > attachment (sensitive medical data) will be signed with a qualified
> > signature, S/MIME signature will not be the only way for ensuring
> > integrity and authenticity.  But what is critical for us is the
> > confidentiality protection agains the email provider, and we can't use
> > it in Thunderbird with our certificates :(
>
> There is not such thing as confidentiality if you don't have
> authentication of the person you are sending the message to. Any plan
> would have to take that into account.
>
> If you are willing to make a proposal with some code to do this right
> (find the cert in a secure ldap by email address, for instance, and
> allow that to be the authoritative binding), then I'll be happy to
> review your proposal and code.
>
> bob>> Validating signature? I'm pretty sure if we can't bind the cert to the
> >> sender's email address, we mark the signature as invalid. If that isn't
> >> happening it's a bug! (It may be that you have explicitly marked this
> >> cert as trusted for this email address?)
> > I've checked it several times and certificates without email address
> > can be used for signing messages. Thunderbird (as well as outlook and
> > outlook express) give a warning that states that the signature is
> > valid but email addresses in the certificate and in the message are
> > different.
>
> Yes, and thunderbird shows a broken signature for that.
>
> > As I've already mentioned, the relevant RFCs require that
> > such certificates should be accepted, so I am not sure if it is a bug.
> > So, to cut a long story short, I understand your argument, but I also
> > think that in some scenarios it can make sense to allow usage of
> > certificates that do not contain email addresses.
>
> I'm okay with some of those scenarios, and if you are willing to do the
> work to make them work, I'm willing to review the code.
>
> bob

Great! I'll see what I can do.

Sergei
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to