[15855] in cryptography@c2.net mail archive
Re: should you trust CAs? (Re: dual-use digital signature
daemon@ATHENA.MIT.EDU (Aram Perez)
Fri Jul 30 14:57:36 2004
X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Wed, 28 Jul 2004 22:00:01 -0700
From: Aram Perez <aramperez@mac.com>
To: Adam Back <adam@cypherspace.org>, <Michael_Heyman@mcafee.com>
Cc: Cryptography <cryptography@metzdowd.com>
In-Reply-To: <20040728180903.GA1876@bitchcake.off.net>
Hi Adam,
> The difference is if the CA does not generate private keys, there
> should be only one certificate per email address, so if two are
> discovered in the wild the user has a transferable proof that the CA
> is up-to-no-good. Ie the difference is it is detectable and provable.
As far as I know, there is nothing in any standard or "good security
practice" that says you can't multiple certificate for the same email
address. If I'm willing to pay each time, Verisign will gladly issue me a
certificate with my email, I can revoke it, and then pay for another
certificate with the same email. I can repeat this until I'm bankrupt and
Verisign will gladly accept my money.
I agree with Michael H. If you trust the CA to issue a cert, it's not that
much more to trust them with generating the key pair.
Respectfully,
Aram Perez
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com