RE: dual-use digital signature [EMAIL PROTECTED]

2004-08-01 Thread Peter Gutmann
<[EMAIL PROTECTED]> writes: >Your certificate definition says "additionalRecipients", mine says >"additionalSubjects", Fred-over-there's says "coKeyOwners". The OIDs for >these extensions end up all different. A human may be able to parse the >intent from the ASN.1 it but email programs will have

RE: dual-use digital signature [EMAIL PROTECTED]

2004-07-30 Thread Peter Gutmann
<[EMAIL PROTECTED]> writes: ><2 cents>In the business cases pointed out where it is good that the multiple >parties hold the private key, I feel the certificate should indicate that >there are multiple parties so that Bob can realize he is having authenticated >and private communications with Alic

RE: dual-use digital signature [EMAIL PROTECTED]

2004-07-28 Thread Michael_Heyman
> From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] On Behalf Of Peter Gutmann > Sent: Saturday, July 24, 2004 9:07 PM > [SNIP] > A depressing number of CAs generate the private key > themselves and mail out to the client. > Replies to this talked about business cases to have control of the pri

Re: dual-use digital signature [EMAIL PROTECTED]

2004-07-28 Thread Ian Grigg
Peter Gutmann wrote: A depressing number of CAs generate the private key themselves and mail out to the client. This is another type of PoP, the CA knows the client has the private key because they've generated it for them. It's also cost-effective. The CA model as presented is too expensive. If

Re: dual-use digital signature [EMAIL PROTECTED]

2004-07-28 Thread Peter Gutmann
Richard Levitte - VMS Whacker <[EMAIL PROTECTED]> writes: >Peter, are you talking about generic CAs or in-corporation ones? Both. Typically what happens is that the CA generates the key and cert and mails it to the user as a PKCS #12 file, either in plaintext, with the password in the same email

Re: dual-use digital signature [EMAIL PROTECTED]

2004-07-28 Thread Peter Gutmann
Anne & Lynn Wheeler <[EMAIL PROTECTED]> write: >the assertion here is possible threat model confusion when the same exact >technology is used for two significantly different business purposes. I don't think there's any confusion about the threat model, which is "Users find it too difficult to gen

Re: dual-use digital signature [EMAIL PROTECTED]

2004-07-26 Thread Anne & Lynn Wheeler
At 02:00 PM 7/26/2004, Richard Levitte - VMS Whacker wrote: That's all and well, but I can't see why that would be interesting to a generic, third-party CA. If you're talking about a CA within the same corporation, then I can understand, since they usually (as far as I can guess) work from a diffe

Re: dual-use digital signature [EMAIL PROTECTED]

2004-07-26 Thread Richard Levitte - VMS Whacker
In message <[EMAIL PROTECTED]> on Sun, 25 Jul 2004 13:41:56 -0600, Anne & Lynn Wheeler <[EMAIL PROTECTED]> said: lynn> At 07:07 PM 7/24/2004, Peter Gutmann wrote: lynn> >A depressing number of CAs generate the private key themselves lynn> >and mail out to the client. This is another type of PoP,

Re: dual-use digital signature [EMAIL PROTECTED]

2004-07-26 Thread Anne & Lynn Wheeler
At 07:07 PM 7/24/2004, Peter Gutmann wrote: A depressing number of CAs generate the private key themselves and mail out to the client. This is another type of PoP, the CA knows the client has the private key because they've generated it for them. one could claim that there might be two possible us

Re: dual-use digital signature [EMAIL PROTECTED]

2004-07-25 Thread Peter Gutmann
"Sean W. Smith" <[EMAIL PROTECTED]> writes: >I would have thought that de facto standard approach is: the client >constructs the certificate request message, which contains things like the >public key and identifying info, and signs it. The CA then checks the >signature against the public key in

Re: dual-use digital signature [EMAIL PROTECTED]

2004-07-21 Thread Sean W. Smith
On Jul 19, 2004, at 11:40 AM, Anton Stiglic wrote: The X.509 PoP (proof-of-possession) doesn't help things out, since a public key certificate is given to a user by the CA only after the user has demonstrated to the CA possession of the corresponding private key by signing a challenge. I suspect