[637] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re: Re- Hierarchies and Webs of

daemon@ATHENA.MIT.EDU (John Linn)
Wed Apr 26 12:40:41 1995

To: Rich Salz <rsalz@osf.org>
cc: owner-www-security@ns2.rutgers.edu, www-security@ns2.rutgers.edu,
        linn@cam.ov.com
In-reply-to: Your message of "Wed, 26 Apr 1995 00:07:06 EDT."
             <9504260407.AA21152@sulphur.osf.org> 
Date: Wed, 26 Apr 1995 08:19:30 -0400
From: John Linn <linn@cam.ov.com>
Errors-To: owner-www-security@ns2.rutgers.edu

Clarification:

>>The "hierarchical approach" you are referring to is that used by PEM, based on
>>X.509.  This builds on a lot of structure to constrain what you refer to as
>>"transitivity".
>
>Yes, classic PEM depended on Internet-wide X.500 deployment.  

Not quite.  Classic PEM's dependency is on X.500 name representations
in X.509 certificates; there is, however, no dependency on use of
an X.500 directory to store those certificates.  As with any
certificate-based approach, availability of a directory or other
queriable certificate repository is highly desirable, but it was
an important feature of the PEM design to enable "in-band" transfer
of certificate chains along with messages, thus allowing a
best-effort level of operation without a globally-accessible 
certificate repository.

--jl



home help back first fref pref prev next nref lref last post