Bear Giles wrote:
> 
> > What would you classify as "bad data" in this case?
> 
> A fake root cert and HTTPS certs.  Then you do a DNS attack, the victims
> get the blackhat HTTPS site but when they check the public cert respository
> it comes back with a full cert chain.
> 
> Ditto bad object signing certs, bad S/MIME certs, etc.
> 
> Prime example: the bogus Microsoft cert Verisign issued a while back.
> That's precisely the type of thing I have in mind.  (I doubt Verisign
> would use my postgresql extensions and these plugins, but a university
> or midsized company might.  Want to get a quick A average, or sidestep
> a difficult course?)
> 

So how would protection against such "bad data" be done at the database
level?

> > What I meant to say was that some checks are easier to perform outside
> > the plugin and may be application specific.
> 
> I agree that some checks are easier to perform outside the plugin, but
> my point is that sometimes a plugin may be designed for a specific role
> that requires it be more aggressive about checking the data for itself.
> "Weakest link in the chain" and all that.
> 

Yes I suppose so. For some applications either a simple file based or
memory based database would be appropriate. Its not that appropriate for
a big CA, though that hasn't stopped some people using the index.txt
stuff for that purpose.

> > Is there some specific reason why the API should return a "key" at all
> > and not just the certificate (or whatever) it corresponds to?
> 
> As I've mentioned elsewhere, Enterprise Jave Beans.  I know this is C,
> not java, but it isn't hard to write a JNI layer to bind the two.... and
> a lot of routine chores are a lot easier in java than in C.
> 

I'm not sure where that Java reference fits in, but I don't use Java
much.

> There's also the issue of memory requirements.  If your plugin is
> covering the cert store for, oh, a major state university you may have
> 50,000+ certs in it.   Do you really want the system to try to allocate
> sufficient space to hold *that* response?

Actually I wouldn't want the API to be designed such that it would have
to return 50,000+ matches at all. PKCS#11 for example handles this by
system where the first/next n matches can be retrieved and the search
can be terminated without retrieving all matches.

Steve.
-- 
Dr Stephen N. Henson.   http://www.drh-consultancy.demon.co.uk/
Personal Email: [EMAIL PROTECTED] 
Senior crypto engineer, Gemplus: http://www.gemplus.com/
Core developer of the   OpenSSL project: http://www.openssl.org/
Business Email: [EMAIL PROTECTED] PX-Mozilla-Status: 0009


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to