At 07:02 PM 5/23/00, you wrote:
>I feel everyone is missing the point.
>
>What do I do as a company when I want to "acquire" 1,000's of user certs so
>that my users can (e.g.)  use IPSec VPN solutions over the Internet to
>access corporate services?

Simple answer, you don't. IPSec does not require a 'public' cert, .. most IPSec 
systems we have configured just generate their own (I think, .. at least we have never 
had to deal with an external cert). We then issue *client* certs for the remote 
routers.

>I don't _need_ a major CA to be guaranteeing the validity - I need to be the
>CA!

True! The only reason to subscribe to a Certified Cert is if you want to avoid users 
getting the 'do you trust this source' message.

>Other commercial outfits are producing CAs (Microsoft come to mind - anyone
>running Active Directory!?!?!?), so why cannot there be an Opensource one?!?!?

I must have missed something in this thread? Is there a problem with openca 
(www.openca.org)??

         Lee
============================================
    Leland V. Lammert                                [EMAIL PROTECTED]
       Chief Scientist                         Omnitec Corporation
   Network/Internet Consultants              www.omnitec.net
============================================

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to