Jim Starkey wrote:
> When you get down to essentials, that's basically the same technology that
I'm suggesting for a key server, the only difference is the certificate says
a trust third party vouches for me as opposed to the key server already
knowing the IPs.  And, not incidentally,  the key server idea doesn't
require the pain and expense of buy and maintaining certificates.

Validating by IP is one way, but pinning down to specific clients has its
own merit as well because of the NAT issue, and you don't need to buy
anything to run your own certificate authority: this is a good use case for
that.

Rather than have client certs be bought from a third party (GoDaddy or
Verisign or whatever), the operator of the db server would set up their own
mini-CA and issue client keys signed by the server end.

Then, when clients connect, rather than validate the cert by chaining down
from the known root CAs, it just validates against its own internal CA
(plus, you'd have to set up a CRL, something that's straightforward, though
in practice I suspect many skip this step).

None of this requires spending any money with a third party, nor *trusting*
a third party, and the client who's handed the cert doesn't have to do any
kind of verification on it.

This may not scale to really large installations that have many many
clients, but most of the bad stuff with PKI (Verisign and Godaddy, mainly
:-) is eliminated.

Steve


------------------------------------------------------------------------------
Firebird-Devel mailing list, web interface at 
https://lists.sourceforge.net/lists/listinfo/firebird-devel

Reply via email to