Hallo Philipp

On Thu, 2009-06-25 at 13:20 +0200, Philipp Kern wrote:
>   But now you also raise another
> certificate authority...
What do you mean? GridKa-CA?

> How would the certificate be used?  Sadly I don't know how those grids
> work[*].  Would users need the certificate installed or somehow the
> individual nodes?  (As for the latter they can be put into
> /usr/local/share/ca-certificates with the newest version.)
Both,... in principle there's nothing special about Grid-Certificates...
you give them to hosts,.. and to users (and sometimes even to
services),.. and they're used to authenticate to each other.

What do you mean, should be put under /usr/local?


> Well, it's X.509.
Unfortunately ;)


> I won't include every intermediate root out there.
> I'm already happy that DTAG will be included in nss for Firefox 3.5,
> so that I can get rid of that certificate in ca-certificates.
> That's also why your Mozilla root example doesn't hold at all.  It's
> not
> how X.509 works.  In this case Mozilla would not only sign the other
> roots but issue them.  There is no real cross-signing facility there.
> I'm also not happy that I cannot assign trust values to certificates
> like Mozilla does in their truststore, so this is kind of best effort.
Uhm,.. perhaps the problem is, that I'd expect something different from
ca-certificates, that it actually is.

In principle I'd like to have the following (please don't feel
offended,... I'm not wanting to tell you how to do your job ;)):
ca-certificates:
Should perhaps only contain the infrastructure, like man-db for manpages


Another package, e.g. ca-certificates-data, could contain CA-root-certs,
that have been "validated" by Debian, e.g. :
ca-cert
Verisign/thawte
DFN
several goverment root CAs
etc. etc.

This package could also contain some information, how each root-cert was
"validated", e.g.
- simply downloaded from their webiste
- verified by personal meeting between Debian developer X, Y and Z with
Verisign representative A, B and C on April 1th 2000 in Munich.
- compared with the version that is distributed by Mozilla and/or
Microsoft and/or Terena Tacar
- etc.

A user could then choose which ones he want to activate.


Of course this would probably a major rewrite of the ca-certificates
package :-/
But from a security point of view, I think that's not the best way to
delegate the "trust-work" to e.g. Mozilla, or Deutsche Telekom, when it
goes about validating other Root-CAs


Of course you're right,.. we cannot/should not include every
intermediate CA, but here I'd say the following:
For example DFN is clearly not intermediate,... it's an own
PKI-hierarchy.
It's sub-CA's (e.g. the CA's of most German Universities) _ARE_
intermediate CA's, because they all follow the same policy.

So perhaps it would be good to differ between CA and PCA (Policy CA),
like DFN does:
CACert, Verisign, thawte, Deutsche Telekom, DFN, or e.g. Germanys
Bundesnetzagentur (the top-authority for Germanys digital signatures)
are PCA's
But LMU-CA, TUM-CA (CA's from German Universities below the DFN
hierarchy) or CA's below the Bundesnetzagentur are only intermediate
CA's and should thus not be included.

There _can_ be examples where it makes sense to even include
intermediate CAs (IMHO).
StartCom is proably a PCA,.. but it provides the XMPP intermediate CA,
which gives free server certs for Jabber-Servers.
As this cert is probably needed by most Debian-Jabber-Admins,.. it may
be ok to include it.


Best wishes,
Chris.


> [*] Despite being a student in Karlsruhe.  Oh well.  It's not that you
>     would get access to such things easily.  ;-)
I'm not fully sure,.. but I think they're still have one or two open
positions at GridKa ;)

Attachment: smime.p7s
Description: S/MIME cryptographic signature

Reply via email to