Robert Joop schrieb:
> 
> the current certificate revocation stuff assumes that the user
> - still has the key
Bug #409602
> - uses netscape
> - is willing to turn javascript on
>
> any of these may not be given.
> 
> what about the "PIN" that the user had to enter when they applied for
> the certificate?
> its only purpose is to authenticate the certificate owner in the case of
> revocation, right?
> 
> apart from its disadvantage that the user may have forgotten their
> password, using it has the advantage that none of the above three
> conditions must be met.
> 
> so, it looks like the best solution is to implement both ways?
> (but i think the PIN based way is more important than the signature
> based way, because that's what works if e.g. the key got stolen.)

The solution for the known bug #409602 will be implemented in exact this
way. I plan a second solution where the RA Operator itself do the
initial revocation request. This works like a helpdesk.

Regards Michael 
-----------------------------------------------------------------------
Michael Bell                       E-Mail: [EMAIL PROTECTED]
Rechenzentrum - Datacenter           Tel.: +49+(0)30-2093-2482
Humboldt-University of Berlin        Fax.: +49+(0)30-2093-2959
Unter den Linden 6
10099 Berlin
Germany

Kryptographische Unterschrift mit S/MIME

Reply via email to