On Wed, Jul 15, 2009, tito wrote:

> thank you for replying..
> 
> This is what I can conclude from the inputs i got.
> 
> 1. Mozilla has no way to lock/disable the private key export when we export
> the certificate.
> 
> 2. I would have to trust my agents/or write in contract , that he will not
> use the certificate other than the designated PC where the request for the
> certificate was done.
> 
> If anyone is having any other opinions about it.Please let me know. Thanks a
> lot.
> 

It seems your threat model is only against a non-tech savvy user. MSIE
unexportable private keys can be exported if you know how and even if you
could enforce greying out of the Mozilla export option the certificate and key
database files are easily backed up anyway.

A possibility would be to use a PKCS#11 soft-token which wont export keys. I'm
not aware of any such thing but it could be done. It would need to encrypt
it's key database in such a way that it would only work on one PC.

Again a knowledgeable user could easily bypass that and nothing short of a
hardware token would help against that.

Steve.
--
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see: http://www.openssl.org
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to