Nelson,

I think you may want to qualify your message in this paragraph, so as
to not mislead people who don't understand PKI very well.

As I'm sure most people on this list know, every Root CA certificate is
a self-signed certificate.  There is nothing inherently insecure about
such certificates, or the ones they issue.  It is the policies,
procedures and technology used to protect the components of a PKI that
make them secure or insecure (as some recent discussions on this list
are highlighting).

What makes self-signed *end-entity* certificates insecure is that RPs
are required to make trust decisions about the certificate(s) with
little or no knowledge about them.  However, there are many situations
where self-signed end-entity certs may be acceptable even in Production: 
point-to-point security between servers where the client and server are
controlled by a single individual/group.  Since this individual/group
is/are the creators and relying parties themselves, as long as the
components of their infrastructure are well-protected, these self-signed
certs could be deemed secure.

That said, any infrastructure that used PKCS components is better served
building a PKI - no matter how small it may be - to manage the certs and
the procedures used in managing them.  Additionally, they should also
use some hardware crypto module - smartcard, TPM or HSM - to protect the
private-key of their certificates.

If they do these two things and follow their self-directed policies and
procedures with reasonable diligence, then I would argue that there is
no difference between self-signed or public-CA issued certs.

Arshad Noor
StrongAuth, Inc.

Nelson B Bolyard wrote:
> The big warning paragraph that you quoted (and I snipped) is really trying
> to warn against the use of certutil (or any tool that produces self-signed
> certificates) for certificate issuance in production environments.  The
> page is explaining how to setup a very small scale CA using certutil for
> use in very small scale test environments.  The warning is intended to be
> "If you use self-signed server certs in production, you'll be sorry!".
> It doesn't say that very well.  The warning sounds like it's saying
> "certutil does a bad job of issuing self-signed certs", but that's not the
> issue.  Some people read it as if it is saying "don't use certutil for this,
> but instead use some other tool like OpenSSL", and that's exactly the wrong
> message.  The message is: "don't use self-signed server certs in production.
>  The tool that makes them doesn't matter. Self-signed certs are bad for
> production."
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to