[5660] in Kerberos

home help back first fref pref prev next nref lref last post

Re: SSL as Kerb replacement

daemon@ATHENA.MIT.EDU (Donald T. Davis)
Thu Aug 10 19:57:42 1995

To: kerberos@MIT.EDU
Cc: bkelley@cat.cup.hp.com
Date: Thu, 10 Aug 1995 19:48:57 -0400
From: "Donald T. Davis" <don@cam.ov.com>

here is bob kelley's response to my discussion
of my man-in-the-middle attack on ssl. i have
responded to him in private e-mail. if there's
interest, i'll summarize the conclusion of our
exchanges for the list, once we're done.

				-don davis, boston

------- Forwarded Message

From: Bob Kelley <bkelley@cat.cup.hp.com>
Subject: Re: SSL as Kerb replacement
To: don@cam.ov.com (Donald T. Davis)
Date: Thu, 10 Aug 1995 15:25:17 -0700 (PDT)

Hi Don,

Thanks for the note.  The original note I saw from you
was on the usenet group for kerberos.  Are there any
mailing lists dedicated to kerberos that you are on?
I would like to subscribe to these.

I think your concern over the top level CA public key's
authenticity may be a little too great.  I mean right now
it is true that the rsa/verisign an netscape ca public
keys are hardcoded into the sslref2.0 from netscape.  In
my version, I could just have them reference a directory
of trusted CA public key certs that have been verified somehow
by the administrator.  For people who are very concerned
about the CA certs, we could set up delivery processes
to provide the certs securely: fingerd/httpd, FAX, normal
mail, or phone confirmation.  By using multiple approval
channels, I think I could be 100% sure of the CA cert.


 
- -- 
 Bob Kelley              Bkelley@cup.hp.com            1-(408)-447-2841
 Hewlett-Packard    19420 Homestead Road MS 43LF    Cupertino, CA 95014  
     (PGP pubkey available from bkelley-pgp-pubkey@cat.cup.hp.com)        


------- End of Forwarded Message


home help back first fref pref prev next nref lref last post