How are cert renewals handled? Will you send an e-mail about certs soon
to be expired to encourage the user to send in a newer cert?

Not yet, but it wouldn't be a lot of work to setup a daily cronjob that walks through the list of stored certs.


Also note that one of the issues is that the From address is not
trusted. So you have to extract e-mail addresses from the cert.

I completely ignore the From: address.
Only the signed message is processed.
E-Mail addresses are taken from the signature certificate, only.


Will your LDAP server be freely accessible? I'd like to add it to my
demo server list for web2ldap:

Right now there is no LDAP server. It's all flat files.


Also a link like
<a
href="mailto:smime-keyser...@kuix.de?BODY=allow-smime-keyserver-inclusion";>smime-keyser...@kuix.de</a>

Thanks for the proposal! Added.


> Another short note: The problem with solely distributing the S/MIME
> certs is that a MUA does not have the S/MIME capabilities of the cert
> owner's MUA. So the sender MUA might choose a weak symmetric cipher.
> ...
> So the safest way is still to send a signed e-mail for cert exchange. :-/

This seems to be solved with my implementation, because my keyserver can forward the original signed message.

Regards
Kai
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to