On 6 Oct, 11:02 pm, tobias.oberst...@tavendo.de wrote:
Personally, I assume root CA private keys of any CA vendor are owned by
the NSA anyway.

There's no rule that says you have to use a "root CA" signed certificate
for your TLS connections.

Sure, in theory, but there are multiple practical problems when using
self-signed certs or certs signed by a CA not built into browsers. As a
starter, here are 3:

- enterprise networks might block those right away with no way for the user
to accept self-signed or import alien CA certs
- the user experience is bad: Firefox scares with dialogs and multiple steps
of overcoming those
- with WebSocket, browers will not even show a dialog! WebSocket are so
called "subresources", and browsers will never render dialogs for these

So in practice, I _have_ to use a CA that is built into all major browsers.

You're assuming a lot here. Perhaps TLS is broken for all the uses you're interested in - that doesn't mean it's broken for everyone else's uses.

*This* is probably now sufficiently off-topic, though...

Jean-Paul
/Tobias

Jean-Paul
Really, TLS is broken.

We need a new scheme. For encryption session keys, Diffie-Hellman is
available, and provides perfect forward secrecy naturally.

For authentication, we need a peer-based system like PGP has, not
relying on centrally managed trust.

I know. Not going to happen any time soon ..

/Tobias

_______________________________________________
Twisted-Python mailing list
Twisted-Python@twistedmatrix.com
http://twistedmatrix.com/cgi-bin/mailman/listinfo/twisted-python


_______________________________________________
Twisted-Python mailing list
Twisted-Python@twistedmatrix.com
http://twistedmatrix.com/cgi-bin/mailman/listinfo/twisted-python

_______________________________________________
Twisted-Python mailing list
Twisted-Python@twistedmatrix.com
http://twistedmatrix.com/cgi-bin/mailman/listinfo/twisted-python

Reply via email to