Evilbunny, > MKC> The idea is to use the Verified Identity (IV) CA to get credibility to > MKC> the name. This will become clear when we put the VI CA online in a few > MKC> days -- then you'll see what it is capable of. I'll let you know when > MKC> it's online. Meanwhile, its main ideas are described in the paper. But > MKC> the idea is this: only the VI certs should be widely trusted. The EL > MKC> certificates should be only a initial jumpstart to get a first certifi- > MKC> cate. The user's aim should be to "upgrade" it to VI status. > > Make sense I guess, however I think it would be too confusing for most > joe public's out there to comprehend beyond the warnings the browsers > spew at them...
Indeed it is. But IMHO this is a problem of the current generation of web browsers. The digital certificate UIs are anything but easy to use. Everyone who has tried knows that the average user thinks that all this certificate mumbo-jumbo is way too complex, too cumbersome. The famous "Why Johnny can't encrypt" paper illustrates this well for PGP; someone's got to write a usability paper of recent https-capable browsers. (We're actually thinking of doing that :)) My guess we'll have to wait for a new generation of browsers that build on this previous experience to fix that up -- and we dare to think that a collaborative certificate infrastructure like the one we are proposing stands a better chance of becoming more widely deployed, widely accepted than the outrageously expensive alternatives offered by commercial CAs that we were alluding at the start of this thread. And, most importantly, contribute to make them more widely understood and, in turn, the software that uses them more user-friendly. As long as certificates are expensive and impopular, they'll continue to be rare, misunderstood, misused. OpenSSL is doing a great job of laying out the middleware to make certificates free. But we still lack a widely accepted PKI and we still lack decent apps. Oh my. Seems like I got carried away again. Sorry for the rant. :) > MKC> I saw your CA site. Quite cool. What's the underlying platform? > > Front end is PHP based, with all operations feeding a MySQL table, > which is then crontab'd to trigger a c programmer to interact with > openssl, hoping to get a 2nd box and pipe data via a serial cable so > that the worst that can happen is fraudulent certificates are issued, > rather then the private key nabbed... (ie only interfaces into the box > are via serial cable and physical console access...) well unless > anyone has a better suggestion? Ours is Perl-based. We prefered Postgres because we wanted transactions (to follow the ideas outlined in Peter Gutmann's ideas about certificate management as transaction processing and because our local DBAs liked it most :)). Just as you, we plan to have a second box to be the "signing engine" (we considered a fancy cryptoprocessor, but we decided to stick with cheaper hardware and open-source software) connected via serial cable. Maybe put it in a tempest-shielded safe and all that. But this is somewhat further away in the future. First we'd like to build a user base that justified all these precautions. Seems to me that we have a lot in common. Maybe we could join forces? -K. ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]