On 5/23/25 10:08 AM, John R. Levine via NANOG wrote:
I'm having trouble coming up with plausible scenarios where the only thing you know about a client is that some CA said their domain is OK.

You don't know that a client is ok.

What you do know is that a CA said that the entity with the certificate and corresponding key is a stated identity; e.g. the subject.

Look at Kerberos, the KDC doesn't say anything other than the ticket holder has proven their identity to the KDC, ostensibly with username & password or something stronger.

The Kerberized server uses the ticket that the client provided it as verification of identity from the common trusted source; the KDC.

None of Kerberos, usernames & passwords, TLS client certificates actually say anything about the credentials not being compromised. They state / demonstrate that the entity using said ticket, U&P, cert have access to the necessary knowledge / data to validate as the claimed identity.

Similar to how HTTPS only speaks to the connection to the server being encrypted, and nothing about the safety of visiting the site.



--
Grant. . . .

_______________________________________________
NANOG mailing list https://lists.nanog.org/archives/list/[email protected]/message/S6FGSBRZ4LKDVQQVD3E3WN6OHKPK7BPH/

Reply via email to