On 6 Dec 2000, Owen Boyle wrote:

> Michael wrote:
> > Is there any reason to pay for Verisigned keys or does setting up our
> > companies own CA work equally well?
> 
> Technically, a self-signed certificate will work perfectly well.
> However, the browser will "inform" the user that it doesn't recognise
> the authority that signed this certificate. If you use Verisign etc..
> the browser will already recognise them as a Certificate Authority and
> accept the certificate without a squeak.
> 
> It depends what you want to use SSL for. If you want strangers to send
> you their private details, you'd be better off with a commercial
> certificate since they won't be frightened by the "warnings". However,
> if you are using SSL for a specific closed group of users, then use your
> own certificate and inform them about it...

All true... but the primary motivation (IMO) for using a cert is if you 
are doing business with the general public (i.e. strangers). Customers 
who see warning messages emitted by their browser when they encounter a 
cert that's not signed by one of the browser-recognized CAs tend to get 
"cold feet". Therefore online merchants rush to pay Verisign and their 
ilk a fee for a cert that buys them some "warm and fuzzies".

A cynic might argue that CAs represent the sleaziest sort of pandering; 
that it is designed to exploit the ignorance of the average consumer 
who believes that because his browser doesn't tattle on an "official" 
cert that he's dealing with a reliable party. He might also suggest 
that the entire CA industry is the result of a collusion of greed that 
is a result of RSA's partial ownership of Netscape.

Good thing I'm not a cynic :)

Best Regards,
James Moore
______________________________________________________________________
Apache Interface to OpenSSL (mod_ssl)                   www.modssl.org
User Support Mailing List                      [EMAIL PROTECTED]
Automated List Manager                            [EMAIL PROTECTED]

Reply via email to