Hi,

>> I was there at IMC and spoke with Zakir. He was not aware of the fact
>> that the private keys to all the intermediate certificates are held by
>> the central DFN Verein, not the RAs themselves. In the case of DFN, the
>> intermediate certs only identify the RAs. The RAs do not carry signing
>> power.
> 
> What is the function of an RA, then, if not to tell a CA "sign this"?

I'll add the following in addition to what Jeremy said: the term RA is
used with different meanings by CAs. E.g. during the Comodo incident in
2011 (the one by Comodohacker), it became clear that the RA had access
credentials stored that allowed it to trigger certification by the CA.
This was really what others might call a reseller or possibly a
subordinate CA.

In the case of DFN, it is different. The RAs are 1) identifiers in
intermediate certs and 2) carry out paperwork. I request a server cert
by creating a CSR in DFN's online interface, but I send a paper form to
the local RA who will then contact me to verify that I am indeed a TUM
employee with control over the server (and in case of S/MIME, see my
passport). There does not seem to be an automated trigger from the RA
that causes certification; rather it seems to be a delegation of certain
duties. The whole thing is specified here:

https://www.pki.dfn.de/fileadmin/PKI/Konzept_DFN-PKI.pdf


Ralph

-- 
Ralph Holz
I8 - Network Architectures and Services
Technische Universität München
http://www.net.in.tum.de/de/mitarbeiter/holz/
Phone +49.89.289.18043
PGP: A805 D19C E23E 6BBB E0C4  86DC 520E 0C83 69B0 03EF
_______________________________________________
therightkey mailing list
therightkey@ietf.org
https://www.ietf.org/mailman/listinfo/therightkey

Reply via email to