On Mon, 4 Feb 2002 17:20:06 -0500, bjw wrote:

>I am trying to provide private company sensitive information to our
>"off-site" technicians and sales people.  The information is to be presented
>via http (preferably https) to simplify the access and to keep it private.
>It's nothing secrete but not anyone else's business, either.

        That's a perfect application for a private CA. Personally, I'd still use a 
VeriSign (or other public CA) certificate if it was only one server, simply 
because it's easier than going to the trouble of getting everyone to install 
your root certificate. However, if you envision your own public key 
infrastructure, then you might as well get started now.

>I was wishing to provide my own CA, because I trust myself and so will our
>off-site staff.  I/we are not dealing with the general public, so, I do not
>(feel) I require the extra level of trust that would provided by a public CA
>(verisign, Equifax, etc,)  I chose ssl because it seem to be an inexpensive,
>quick, simple and secure method in place of RAS, VPN or ssh. At least for my
>needs.

>Perhaps, I am using ssl incorrectly by trying to use a my own (private) CA?
>Am I setting my self up for disaster?? Is there better solution?!?

        No, that's fine. You just need some secure way to get your root certificate 
out to everyone who needs to use it. If you can distribute it some secure 
way, then you're set (for example, you can put it on a secure file server or 
you can include it in the installation package for some company software). 
Otherwise, I'd again suggest one VeriSign key so that people can be sure 
they're talking to you when they get your root certificate.

        I still recommend that in most cases you have at least one thing signed by a 
public CA to 'root' the system. For example, how do I know the root key that 
you claim is yours is really yours? If you can sneaker net it to each 
machine, or you're more interested in protecting against passive interception 
over the wire, you don't need to be paranoid about this.

        So what it comes down to is, do you have a secure way to distribute your 
root certificate and get it properly installed in the browsers of everyone 
who's going to use your system? Are you more concerned with interception 
prevention than source authentication or do you have a distribution means you 
have confidence over?

        If you set up your own root certificate and do go to the trouble of 
distributing it, I'd suggest you create it so it can be used for code signing 
and email as well. That way if you ever decide to use it to authenticate 
email origins or code updates, you won't have to go to the trouble of 
modifying everyone's browsers again.

        DS


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to