certificate questions

2002-10-15 Thread yi kong

We have a Solaris Web server with Apache 1.3.12, OpenSSL 0.9.6 and
ModSSL 2.6.6. Last week the own signed certificate expired. I tried to
renew or recreate one, but not successful. Because we don't have
ramden-number-create package, SUN suggest, instead,  to install the
patch 105710-01, which is a big patch and many file and complicated
procedures. I try to create the server key and server crt from other
Sparc machine. I copped the two file to server and restart the apache.
The certificate expire message still show up and the message is old,
different with the one I typed while create the crt.

Any suggestion will be appreciated

Yi Kong
__
Apache Interface to OpenSSL (mod_ssl)   www.modssl.org
User Support Mailing List  [EMAIL PROTECTED]
Automated List Manager[EMAIL PROTECTED]



Client Certificate questions

2002-02-20 Thread Ron Gage

Hi Folks:

I am having problems getting a self-signed identity (client) cert installed into
my browsers (Mozilla 0.9.8 and Netscape 4.78).

The cert is signed and tested to be valid, I just can't find the right method to
install it into my browser.  I even tried copying the ident.crt to ident.pem and
browsing it with the browsers.  This installed the cert as a server cert, not an
identity cert.

Can anyone provide any hints on how to install a client cert?  Thanks!


-- 
Ron Gage - Owner, Linux Network Services - Saginaw, Michigan - 989-274-8088
Your one-stop source for Reliable, Secure and Affordable Networking Solutions



-
This mail sent through IMP: http://horde.org/imp/

__
Apache Interface to OpenSSL (mod_ssl)   www.modssl.org
User Support Mailing List  [EMAIL PROTECTED]
Automated List Manager[EMAIL PROTECTED]



Re: Client Certificate questions

2002-02-20 Thread CAM



Ron Gage wrote:

 Hi Folks:
 
 I am having problems getting a self-signed identity (client) cert installed into
 my browsers (Mozilla 0.9.8 and Netscape 4.78).
 
 The cert is signed and tested to be valid, I just can't find the right method to
 install it into my browser.  I even tried copying the ident.crt to ident.pem and
 browsing it with the browsers.  This installed the cert as a server cert, not an
 identity cert.
 
 Can anyone provide any hints on how to install a client cert?  Thanks!


Ron,

Not certain about the versions here - I was using NS6.2 on windoze which I 
believe has the same codebase as Moz 0.9.6, no?

Anyway, in the Certificate Manager, we used the (perhaps slightly misnamed) 
Restore function to pick up a PKCS#12 file from the local filesystem. This was 
just the client certificate reworked into PKCS#12 format with openssl - the 
restore file dialog filters for .p12's...

HTH
colm

__
Apache Interface to OpenSSL (mod_ssl)   www.modssl.org
User Support Mailing List  [EMAIL PROTECTED]
Automated List Manager[EMAIL PROTECTED]



Re: Client Certificate questions

2002-02-20 Thread Göran Fröjdh

Den 02-02-20 15.04 skrev Ron Gage [EMAIL PROTECTED] följande:

 Hi Folks:
 
 I am having problems getting a self-signed identity (client) cert installed
 into
 my browsers (Mozilla 0.9.8 and Netscape 4.78).
 
 The cert is signed and tested to be valid, I just can't find the right method
 to
 install it into my browser.  I even tried copying the ident.crt to ident.pem
 and
 browsing it with the browsers.  This installed the cert as a server cert, not
 an
 identity cert.
 
 Can anyone provide any hints on how to install a client cert?  Thanks!

In Netscape and Mozilla, you can import a standard pkcs12 certificate (.pk12
extension), but it's a bit more tedious. It's done via Netscape Prefences 
Privacy  Security  Certificates. Click on Manage Securities and
Restore. Enter your signed certificate, and it will install itself.
/goran


__
Apache Interface to OpenSSL (mod_ssl)   www.modssl.org
User Support Mailing List  [EMAIL PROTECTED]
Automated List Manager[EMAIL PROTECTED]



Re: Client Certificate questions

2002-02-20 Thread Ron Gage

Quoting Göran Fröjdh [EMAIL PROTECTED]:

 Den 02-02-20 15.04 skrev Ron Gage [EMAIL PROTECTED] följande:
 
  Hi Folks:
  
  I am having problems getting a self-signed identity (client) cert
 installed into my browsers (Mozilla 0.9.8 and Netscape 4.78).
  
  The cert is signed and tested to be valid, I just can't find the right
 method to install it into my browser.  I even tried copying the ident.crt to
 ident.pem and browsing it with the browsers.  This installed the cert as a
server cert, not an identity cert.
  
  Can anyone provide any hints on how to install a client cert?  Thanks!
 
 In Netscape and Mozilla, you can import a standard pkcs12 certificate
 (.pk12
 extension), but it's a bit more tedious. It's done via Netscape Prefences 
 Privacy  Security  Certificates. Click on Manage Securities and
 Restore. Enter your signed certificate, and it will install itself.
 /goran
 

Great.  I tried the following:

root@net:/home/ron# openssl x509 -in ident.crt -out ident.p12 -outform pkcs12

I tried to import this file into netscape and into mozilla.  No go - they both
complain that the cert is corrupted.  I guess this begs the question: how does
one go about creating the pkcs12 format certificate?

Thanks

-- 
Ron Gage - Owner, Linux Network Services - Saginaw, Michigan - 989-274-8088
Your one-stop source for Reliable, Secure and Affordable Networking Solutions



-
This mail sent through IMP: http://horde.org/imp/

__
Apache Interface to OpenSSL (mod_ssl)   www.modssl.org
User Support Mailing List  [EMAIL PROTECTED]
Automated List Manager[EMAIL PROTECTED]



Re: Certificate questions...

2000-03-07 Thread Stefan Kelm

Karl,

 However, the concept that a PERSON needs to pay upwards of $100 to get a key
 by which they can have a SSL connection work from a web server is insane.

It is not! It's a business model and if you're not prepared to pay those
commercial CAs - don't.

 Why are there no public CAs - much like the public keyrings for PGP?

But there are:

   http://www.pca.dfn.de/dfnpca/pki-links.html#CA

 Why does Nutscrape and Microslug only ship with COMMERCIAL, and EXPENSIVE,
 CAs loaded?

Because non-commercial CAs simply can't afford to buy themselves into
the products. It's as simple as that. We've tried and we failed.

Cheers,

Stefan.

PS: This really isn't relevant to mod-ssl.

__
Stefan KelmPGP key: "finger [EMAIL PROTECTED]" or via key server
DFN-PCA  [EMAIL PROTECTED]
Vogt-Koelln-Str. 30   http://www.pca.dfn.de/~kelm/
22527 Hamburg (Germany)   Tel: +49 40 428 83-2262 / Fax: -2241
__
Apache Interface to OpenSSL (mod_ssl)   www.modssl.org
User Support Mailing List  [EMAIL PROTECTED]
Automated List Manager[EMAIL PROTECTED]



RE: Certificate questions...

2000-03-07 Thread mads

Karl Denninger wrote:

 However, the concept that a PERSON needs to pay upwards of 
 $100 to get a key
 by which they can have a SSL connection work from a web 
 server is insane.

If you look at the simple operation of signing a server certificate,
then sure, that does seem a bit expensive, BUT that's not all you get.
If it was, then you should just use one of the certificates that 
mod_ssl lets you generate during installation. Setting up a CA to 
issue certificates is technically rather easy - getting the legal
stuff and all the procedures in place is quite a lot more complicated
(trust me - I've been been in that business for a while).
 
 Why are there no public CAs - much like the public keyrings for PGP?
 
Because it wouldn't make any sense - if you don't want liability, 
authenticity checks and lots of other legal stuff, then you might as
well forget about using certificates at all - all you'd have was the
encryption.

 Why does Nutscrape and Microslug only ship with COMMERCIAL, 
 and EXPENSIVE,
 CAs loaded?

You can only guess...
I've heard someone saying that Netscape wanted more than $100K to
put their root cert in the browser - which I suppose would be a
possible explanation.
You might also ask yourself why those two browsers only support
RSA patented algorithms...


vh

Mads Toftum, QDPH
---
The brain is a wonderful organ; it starts working the moment you get up
in the morning, and does not stop until you get to work.
__
Apache Interface to OpenSSL (mod_ssl)   www.modssl.org
User Support Mailing List  [EMAIL PROTECTED]
Automated List Manager[EMAIL PROTECTED]



Re: Certificate questions...

2000-03-07 Thread Jon Earle

At 07:36 AM 3/7/00 -0800, you wrote:
Karl Denninger [EMAIL PROTECTED] writes:
  Well, confidentiality implies integrity, in that a tampered data stream
  won't decode.  Public key crypto with a known certification on the public
  key provides non-repudiation (assuming the private key has not been
  compromised)

This is absolutely not true.

Consider a data stream enciphered with RC4. It's perfectly
easy to undetectably flip any plaintext bit by
flipping the corresponding ciphertext bit. If you know the
plaintext, you can modify it predictably.

Perhaps... but isn't this impractical?  The key phrase here is "If you know the
plaintext...". How would one know if a random, encrypted stream is a 
recipe, a love letter, or a secret message to religious extremists?  It all 
just looks like encrypted packets.

Jon
-
Jon Earle   (613) 612-0946 (Cell)
HUB Computer Consulting Inc.(613) 830-1499 (Office)
http://www.hubcc.ca 1-888-353-7272 (Within Canada/US)

"God does not subtract from one's alloted time on Earth,
those hours spent flying."   --Unknown

__
Apache Interface to OpenSSL (mod_ssl)   www.modssl.org
User Support Mailing List  [EMAIL PROTECTED]
Automated List Manager[EMAIL PROTECTED]



Re: Certificate questions...

2000-03-07 Thread EKR

Jon Earle [EMAIL PROTECTED] writes:

 At 07:36 AM 3/7/00 -0800, you wrote:
 Karl Denninger [EMAIL PROTECTED] writes:
   Well, confidentiality implies integrity, in that a tampered data stream
   won't decode.  Public key crypto with a known certification on the public
   key provides non-repudiation (assuming the private key has not been
   compromised)
 
 This is absolutely not true.
 
 Consider a data stream enciphered with RC4. It's perfectly
 easy to undetectably flip any plaintext bit by
 flipping the corresponding ciphertext bit. If you know the
 plaintext, you can modify it predictably.
 
 Perhaps... but isn't this impractical?  The key phrase here is "If you know the
 plaintext...".
If you know the plaintext you can make PREDICTABLE changes. Without
the plaintext, you can make arbitrary undetected changes.

 How would one know if a random, encrypted stream is a 
 recipe, a love letter, or a secret message to religious extremists?  It all 
 just looks like encrypted packets.
You can tell an incredible amount from traffic analysis.
For instance, connections on port 443 are almost always HTTP
over SSL. If you've been looking at the previous HTTP traffic
between this client and server pair, you can often get a pretty
good idea of what the first encrypted message is.

-Ekr

-- 
[Eric Rescorla   [EMAIL PROTECTED]]
  PureTLS - free SSLv3/TLS software for Java
http://www.rtfm.com/puretls/
__
Apache Interface to OpenSSL (mod_ssl)   www.modssl.org
User Support Mailing List  [EMAIL PROTECTED]
Automated List Manager[EMAIL PROTECTED]



Re: Certificate questions...

2000-03-06 Thread Karl Denninger

On Mon, Mar 06, 2000 at 02:10:42PM -0800, EKR wrote:
 Karl Denninger [EMAIL PROTECTED] writes:
  Well, I understand that, but it seems that people (including Thawte,
  Microslug and Nutscrape) are missing the point.
  
  There are to separate things that secure web servers do.
  
  1.  Authenticate who you're talking to, so that when you engage in
  commerce you have some indication that the merchant you think you're
  dealing with is really who you're dealing with.
  
  2.  Encrypt the data so that it cannot be intercepted between the
  sending and receiving machines.
  
  These are NOT the same function, and needing one of them does not imply
  needing the other.  
 This is incorrect.
 
 Without authentication of the merchant's identity, you're subject to
 a variety of active attacks where the attacker substitutes his
 key for the merchant's.   You can only have encryption without 
 endpoint authentication if your threat model does not include 
 active attack.
 
  Yet, in today's world, you cannot have one without the other, which means
  that to get EITHER you must pay someone.
  
  Contrast this with PGP for email, in which I can publish a public key and
  once you obtain it you're able to receive an encrypted communication from 
  me and decode the traffic.  My generation of that key pair does not require
  that it be "certified" by any third party.
 The generation, no. However, in order for people sending you mail
 to be sure that they are not subject to active key substitution
 attacks, they key pair does need to be securely bound to the
 recipient. Unless you're prepared to exchange keys with all of your
 correcpondents out of band, you do need third party key certification.
 PGP accomplishes this using key signing rather than certificates
 per se, but it's an analagous concept.

Understood.

However, the concept that a PERSON needs to pay upwards of $100 to get a key
by which they can have a SSL connection work from a web server is insane.

Why are there no public CAs - much like the public keyrings for PGP?

Why does Nutscrape and Microslug only ship with COMMERCIAL, and EXPENSIVE,
CAs loaded?

--
-- 
Karl Denninger ([EMAIL PROTECTED])  Web: http://childrens-justice.org
Isn't it time we started putting KIDS first?  See the above URL for
a plan to do exactly that!
__
Apache Interface to OpenSSL (mod_ssl)   www.modssl.org
User Support Mailing List  [EMAIL PROTECTED]
Automated List Manager[EMAIL PROTECTED]



Re: Certificate questions...

2000-03-06 Thread Karl Denninger

Absolutely.

I wonder if the DOJ might be interested in this

--
-- 
Karl Denninger ([EMAIL PROTECTED])  Web: http://childrens-justice.org
Isn't it time we started putting KIDS first?  See the above URL for
a plan to do exactly that!


On Mon, Mar 06, 2000 at 05:29:23PM -0500, Eric Moore wrote:
 It seems there is restraint of trade since only a few 'selected' 
 companies can get on the CA root of IE and Navigator.  To pay USD 300 
 every couple of years to prove you exist is silly.  The price of domaine 
 registration is coming down, why not certs since there is more e-commerce?
 
 In the U.S. the cert only proves you have a DUNS number, a phone number, 
 and a fax'd copy of a state registration.  Every scam artist has those.
 
 EM
 
 
 Karl Denninger wrote:
 
 Well, I understand that, but it seems that people (including Thawte,
 Microslug and Nutscrape) are missing the point.
 
 There are to separate things that secure web servers do.
 
 1.   Authenticate who you're talking to, so that when you engage in
  commerce you have some indication that the merchant you think you're
  dealing with is really who you're dealing with.
 
 2.   Encrypt the data so that it cannot be intercepted between the
  sending and receiving machines.
 
 These are NOT the same function, and needing one of them does not imply
 needing the other.  
 
 Yet, in today's world, you cannot have one without the other, which means
 that to get EITHER you must pay someone.
 
 Contrast this with PGP for email, in which I can publish a public key and
 once you obtain it you're able to receive an encrypted communication from 
 me and decode the traffic.  My generation of that key pair does not require
 that it be "certified" by any third party.
 
 
 ---
 Eric Moore
 Miami, Florida
 
 __
 Apache Interface to OpenSSL (mod_ssl)   www.modssl.org
 User Support Mailing List  [EMAIL PROTECTED]
 Automated List Manager[EMAIL PROTECTED]
__
Apache Interface to OpenSSL (mod_ssl)   www.modssl.org
User Support Mailing List  [EMAIL PROTECTED]
Automated List Manager[EMAIL PROTECTED]



Re: Certificate questions...

2000-03-06 Thread Karl Denninger

On Tue, Mar 07, 2000 at 12:23:33AM +0100, Jan Meijer wrote:
 Hi Karl,
 
 Whilst taking the risk to look like someone from Microshot, Netscape or the
 others some comment on your pleads for clarity.
 
  There are to separate things that secure web servers do.
  
  1.  Authenticate who you're talking to, so that when you engage in
  commerce you have some indication that the merchant you think you're
  dealing with is really who you're dealing with.
  
  2.  Encrypt the data so that it cannot be intercepted between the
  sending and receiving machines.
 
 True.  Crypto allows for two other quite basic functions: non-repudiation
 and integrity.  You only mentioned authenticity and confendiatlity.

Well, confidentiality implies integrity, in that a tampered data stream
won't decode.  Public key crypto with a known certification on the public
key provides non-repudiation (assuming the private key has not been
compromised)

  These are NOT the same function, and needing one of them does not imply
  needing the other.
 
 True

Yep.

  Yet, in today's world, you cannot have one without the other, which means
  that to get EITHER you must pay someone.
 
 The pay part is untrue.  If you really don't care about authenticity but
 only are interested in confidentiality of your datastream (if you cannot
 verify the authenticity of the entities on either side of your datastream I
 think you're quite vulnerable for loosing your confidentiality, but that's
 your choice) you can just generate your own certificate.  What is true is
 that those stupid browser applications refuse to see key generation and the
 *possible* certification as different steps.  With openssl of course this is
 possible.

Yep.

  Contrast this with PGP for email, in which I can publish a public key and
  once you obtain it you're able to receive an encrypted communication from
  me and decode the traffic.  My generation of that key pair does not require
  that it be "certified" by any third party.
 
 I hope you made some typo here.  You do not use the thing conceptually
 referred to as "public key" to decode encrypted traffic/messages.  That's
 what the private thingie is for.  The public part is for signature
 verification (ie verifying the private part has been used to encrypt a piece
 of data).  

Well, yes and no.

If I want to send you a message I can do several things with it:

1.  I can encrypt it with your PUBLIC key.  Once I do that I cannot
recover the message.  Only YOU can recover it, by using the private
key, which in theory at least only you have.  This provides both
confidentiality and data integrity, as the message will not decode
if tampered with.  It does NOT prove that I authored the message
though.

2.  I can SIGN it with my PRIVATE key.  That is basically just taking a
hash seeded with my private key and appending same.  This provides
non-repudiation and data integrity, as the message will not verify
if tampered with, and if it DOES verify against the public key then 
you know the private key was used to sign it with certainty.

3.  I can sign the message with my private key and then encrypt it with
your public key.  NOW I have a message that has all the benefits of
(1) and (2) with one further benefit - only *YOU* can determine
the message's origin!  Without your private key the signature cannot
be read, thus, nobody but you can prove that I sent it.

Now the problem here is that if the private key in question is compromised
then you can sign messages that are from someone else (the person who's key
you have) and you can also read messages sent to someone else (the person
who's key you have).  But that SAME risk exists with certificates, in that
if I get ahold of the private key for your web server (and either break the
PEM passphrase or if you foolishly unlock it) I can now do the same thing.

 Problem with your PGP schema is that I can publish my public key on the
 keyserver (lets say the keys.pgpi.net which I trust a lot ;), you can get it
 there and use it to crypt data for me.  Essential problem here: how do you
 know that the key you're using is mine and not from someone claiming to be
 me (by entering *my* emailaddress and name during key generation)?  Using
 signatures -- signature=certificate.

Simple:

If I use a "spoofed" key you can't read the output.  

Since I have to DELIVER the message to you, if you get something
that doesn't decode, you know the sender got a "bad" public key
from somewhere and its time for you to have a discussion with the
sender and find out where they got the key from.  

The first time you get an undecodable message you know someone 
has done this.

Second, if I get your key from the PGP keyring, I can look at who
has vouched for you (signed your key).  If there's nothing 

Re: Certificate questions...

2000-03-06 Thread EKR

Karl Denninger [EMAIL PROTECTED] writes:
 On Mon, Mar 06, 2000 at 02:10:42PM -0800, EKR wrote:
  The generation, no. However, in order for people sending you mail
  to be sure that they are not subject to active key substitution
  attacks, they key pair does need to be securely bound to the
  recipient. Unless you're prepared to exchange keys with all of your
  correcpondents out of band, you do need third party key certification.
  PGP accomplishes this using key signing rather than certificates
  per se, but it's an analagous concept.
 
 Understood.
 
 However, the concept that a PERSON needs to pay upwards of $100 to get a key
 by which they can have a SSL connection work from a web server is insane.
 
 Why are there no public CAs - much like the public keyrings for PGP?
 
 Why does Nutscrape and Microslug only ship with COMMERCIAL, and EXPENSIVE,
 CAs loaded?
I can't speak for the rationales behind MS or NSCP's policies, but
I don't think this is as simple as you make it out to be.

The issue is maintaining reference integrity for HTTPS transactions.
The client has in hand a URL of the form https://www.example.com/.
When he connects to the server, the server presents his certificate.
This certificate should have the identity "www.example.com" (in the
CN field). If it doesn't, then the browser will pop up a dialog
complaining about this. The reason for this check is (once again)
to prevent active substitution attacks whereby someone with a
legitimate certificate for a different e.g. "www.attacker.com" 
poses as the server.

In order for this procedure to work correctly, the CAs must enforce
the binding between domain name and identity in certificate. If they
don't, then active attacks are possible. Thus, any CA trusted by MS or
NSCP must agree to these rules. But enforcing them is irritating and
expensive. I don't know of any non-commercial CA who promises
to do so.

Your comparison to PGP keyservers really isn't apt. PGP
keyservers are more like LDAP directories than CAs. The provider
of the keyserver doesn't vouch for the keys, he simply serves
them. The signatures on the keys are (usually) those of individuals.

-Ekr
-- 
[Eric Rescorla   [EMAIL PROTECTED]]
  PureTLS - free SSLv3/TLS software for Java
http://www.rtfm.com/puretls/
__
Apache Interface to OpenSSL (mod_ssl)   www.modssl.org
User Support Mailing List  [EMAIL PROTECTED]
Automated List Manager[EMAIL PROTECTED]



RE: Certificate questions...

2000-03-06 Thread Airey, John

-Original Message-
From: Karl Denninger [mailto:[EMAIL PROTECTED]]
Sent: 03 March 2000 15:39
To: [EMAIL PROTECTED]
Subject: Re: Certificate questions...


Hi John,

On Fri, Mar 03, 2000 at 10:06:19AM -, Airey, John wrote:
 Assuming we are talking about Thawte's server test certificates, they are
 only for use for one month. Using them helps you to understand how to
 install a real certificate without running the risk of destroying it (a
very
 real risk with NT!)

Not really true.  You can set the validity up to 365 days.

Obviously Thawte have changed their policy on test certificates then. I
haven't used one for a while but they are a useful test of their certificate
issuing procedure without running the risk of losing money because you get
your csr wrong.

Just to clarify, with Windows NT it is possible to install a certificate and
private key without actually having a copy of them on disk, AFAIK (although
it would be foolish not to keep a backup, wouldn't it?). If you need to
reinstall NT, then you've lost them!

Like I said, if this isn't a public site you can create your own. All a
certificate does is prove who you are, but if you are only securing data for
internal use, you hopefully know who you are anyway.

This reminds me of a joke.

Descartes was in a restaurant having a meal. The waiter asks him "would you
like to see the wine list, Sir?". He replies "I think not" and promptly
vanishes.

(I never said it was a funny joke).

John
__
Apache Interface to OpenSSL (mod_ssl)   www.modssl.org
User Support Mailing List  [EMAIL PROTECTED]
Automated List Manager[EMAIL PROTECTED]



Re: Certificate questions...

2000-03-06 Thread Karl Denninger

On Mon, Mar 06, 2000 at 09:48:47AM -, Airey, John wrote:
 -Original Message-
 From: Karl Denninger [mailto:[EMAIL PROTECTED]]
 Sent: 03 March 2000 15:39
 To: [EMAIL PROTECTED]
 Subject: Re: Certificate questions...
 
 
 Hi John,
 
 On Fri, Mar 03, 2000 at 10:06:19AM -, Airey, John wrote:
  Assuming we are talking about Thawte's server test certificates, they are
  only for use for one month. Using them helps you to understand how to
  install a real certificate without running the risk of destroying it (a
 very
  real risk with NT!)
 
 Not really true.  You can set the validity up to 365 days.
 
 Obviously Thawte have changed their policy on test certificates then. I
 haven't used one for a while but they are a useful test of their certificate
 issuing procedure without running the risk of losing money because you get
 your csr wrong.
 
 Just to clarify, with Windows NT it is possible to install a certificate and
 private key without actually having a copy of them on disk, AFAIK (although
 it would be foolish not to keep a backup, wouldn't it?). If you need to
 reinstall NT, then you've lost them!
 
 Like I said, if this isn't a public site you can create your own. All a
 certificate does is prove who you are, but if you are only securing data for
 internal use, you hopefully know who you are anyway.

Well, I understand that, but it seems that people (including Thawte,
Microslug and Nutscrape) are missing the point.

There are to separate things that secure web servers do.

1.  Authenticate who you're talking to, so that when you engage in
commerce you have some indication that the merchant you think you're
dealing with is really who you're dealing with.

2.  Encrypt the data so that it cannot be intercepted between the
sending and receiving machines.

These are NOT the same function, and needing one of them does not imply
needing the other.  

Yet, in today's world, you cannot have one without the other, which means
that to get EITHER you must pay someone.

Contrast this with PGP for email, in which I can publish a public key and
once you obtain it you're able to receive an encrypted communication from 
me and decode the traffic.  My generation of that key pair does not require
that it be "certified" by any third party.

--
-- 
Karl Denninger ([EMAIL PROTECTED])  Web: http://childrens-justice.org
Isn't it time we started putting KIDS first?  See the above URL for
a plan to do exactly that!
__
Apache Interface to OpenSSL (mod_ssl)   www.modssl.org
User Support Mailing List  [EMAIL PROTECTED]
Automated List Manager[EMAIL PROTECTED]



Re: Certificate questions...

2000-03-06 Thread EKR

Karl Denninger [EMAIL PROTECTED] writes:
 Well, I understand that, but it seems that people (including Thawte,
 Microslug and Nutscrape) are missing the point.
 
 There are to separate things that secure web servers do.
 
 1.Authenticate who you're talking to, so that when you engage in
   commerce you have some indication that the merchant you think you're
   dealing with is really who you're dealing with.
 
 2.Encrypt the data so that it cannot be intercepted between the
   sending and receiving machines.
 
 These are NOT the same function, and needing one of them does not imply
 needing the other.  
This is incorrect.

Without authentication of the merchant's identity, you're subject to
a variety of active attacks where the attacker substitutes his
key for the merchant's. You can only have encryption without 
endpoint authentication if your threat model does not include 
active attack.

 Yet, in today's world, you cannot have one without the other, which means
 that to get EITHER you must pay someone.
 
 Contrast this with PGP for email, in which I can publish a public key and
 once you obtain it you're able to receive an encrypted communication from 
 me and decode the traffic.  My generation of that key pair does not require
 that it be "certified" by any third party.
The generation, no. However, in order for people sending you mail
to be sure that they are not subject to active key substitution
attacks, they key pair does need to be securely bound to the
recipient. Unless you're prepared to exchange keys with all of your
correcpondents out of band, you do need third party key certification.
PGP accomplishes this using key signing rather than certificates
per se, but it's an analagous concept.

-Ekr


-- 
[Eric Rescorla   [EMAIL PROTECTED]]
  PureTLS - free SSLv3/TLS software for Java
http://www.rtfm.com/puretls/
__
Apache Interface to OpenSSL (mod_ssl)   www.modssl.org
User Support Mailing List  [EMAIL PROTECTED]
Automated List Manager[EMAIL PROTECTED]



Re: Certificate questions...

2000-03-06 Thread Eric Moore

It seems there is restraint of trade since only a few 'selected' 
companies can get on the CA root of IE and Navigator.  To pay USD 300 
every couple of years to prove you exist is silly.  The price of domaine 
registration is coming down, why not certs since there is more e-commerce?

In the U.S. the cert only proves you have a DUNS number, a phone number, 
and a fax'd copy of a state registration.  Every scam artist has those.

EM


Karl Denninger wrote:

Well, I understand that, but it seems that people (including Thawte,
Microslug and Nutscrape) are missing the point.

There are to separate things that secure web servers do.

1. Authenticate who you're talking to, so that when you engage in
   commerce you have some indication that the merchant you think you're
   dealing with is really who you're dealing with.

2. Encrypt the data so that it cannot be intercepted between the
   sending and receiving machines.

These are NOT the same function, and needing one of them does not imply
needing the other.  

Yet, in today's world, you cannot have one without the other, which means
that to get EITHER you must pay someone.

Contrast this with PGP for email, in which I can publish a public key and
once you obtain it you're able to receive an encrypted communication from 
me and decode the traffic.  My generation of that key pair does not require
that it be "certified" by any third party.


---
Eric Moore
Miami, Florida

__
Apache Interface to OpenSSL (mod_ssl)   www.modssl.org
User Support Mailing List  [EMAIL PROTECTED]
Automated List Manager[EMAIL PROTECTED]



Re: Certificate questions...

2000-03-03 Thread Mike_Innes



Alex,,
 The trouble with using self signed certs is that you need to install the CA
cert in the browser to stop messages popping up when you connect to the site -
obviously no real problem as you will either be using them for testing or in a
closed environment (or limited number of clients).  Using the 'Free Test
Certificates' from thawte is a little better as the CA cert that they use to
sign the CSR is already installed in Netscape (only 4.7x?).

Karl,
 To avoid this problem 'buy a cert' or install the CA cert into each browser
(have a look at pkg.contrib/loadcacert.cgi)

Mikey




"Alex C. Koch" [EMAIL PROTECTED] on 02/03/2000 19:11:58

Please respond to [EMAIL PROTECTED]

To:   [EMAIL PROTECTED]
cc:(bcc: Mike Innes/Virgin Direct/GB)

Subject:  Re: Certificate questions...




Is getting one of these test certificate better than using a self signed
test certificate that can be generated with openSSL?  I am currently using
a certificate that I generated myself.  What would the advantages be of
using a certificate from Thawte when it is not authenticated by them?


At 11:42 AM 3/2/00 -0600, you wrote:
Hi folks,

I have built the MODSSL package and Apache, and it works.  I got a
"test" certificate from Thawte (their "unauthenticated" one) and it
installed and worked properly.


Alex Koch
[EMAIL PROTECTED]
https://128.253.163.111 (SSL secured)
http://home.adelphia.net/~alexk

-- PGP Keys --
2048 bit RSA key id: 0x58635D8F
4096 bit DH/DSS key id: 0x0784EFC5


__
Apache Interface to OpenSSL (mod_ssl)   www.modssl.org
User Support Mailing List  [EMAIL PROTECTED]
Automated List Manager[EMAIL PROTECTED]










Internet communications are not secure. This message is confidential to the intended 
addressee. Any copying or distribution of it by anyone without the addressee's consent 
may be unlawful. If you are not the intended addressee, please inform us immediately 
and then delete this message. 

Virgin Direct Personal Financial Service Ltd is regulated by the Personal Investment 
Authority for life insurance, pension and unit trust business and represents only the 
Virgin Direct marketing group. Registered office: Discovery House, Whiting Road, 
Norwich NR4 6EJ, UK. Registered in England No. 3072766.

The Virgin One account is a secured personal bank account with The Royal Bank of 
Scotland plc. It is provided by Virgin Direct Personal Finance Ltd which is a 
representative only of Virgin Direct Personal Financial Service Ltd. Registered 
office: Waterhouse Square, 138-142 Holborn, London EC1N 2TH, UK. Registered in England 
no 3414708.

The Virgin Deposit Account is a personal deposit account with The Royal Bank of 
Scotland plc administered by Virgin Direct Personal Financial Service Ltd.


__
Apache Interface to OpenSSL (mod_ssl)   www.modssl.org
User Support Mailing List  [EMAIL PROTECTED]
Automated List Manager[EMAIL PROTECTED]



RE: Certificate questions...

2000-03-03 Thread Airey, John

Assuming we are talking about Thawte's server test certificates, they are
only for use for one month. Using them helps you to understand how to
install a real certificate without running the risk of destroying it (a very
real risk with NT!)

They are not intended for production use. Thawte's own certificates are
accepted by all browsers (AFAIK) and prove to those who connect to your site
that you are the company that you say you are. This is what you pay for, and
if you ask me it's well worth the money.

If you don't intend to connect your site to the outside world, you can make
your own certificates anyway. The documentation to do that comes with
openssl.

John

-Original Message-
From: Alex C. Koch [mailto:[EMAIL PROTECTED]]
Sent: 02 March 2000 19:12
To: [EMAIL PROTECTED]
Subject: Re: Certificate questions...


Is getting one of these test certificate better than using a self signed 
test certificate that can be generated with openSSL?  I am currently using 
a certificate that I generated myself.  What would the advantages be of 
using a certificate from Thawte when it is not authenticated by them?


At 11:42 AM 3/2/00 -0600, you wrote:
Hi folks,

I have built the MODSSL package and Apache, and it works.  I got a
"test" certificate from Thawte (their "unauthenticated" one) and it
installed and worked properly.


Alex Koch
[EMAIL PROTECTED]
https://128.253.163.111 (SSL secured)
http://home.adelphia.net/~alexk

-- PGP Keys --
2048 bit RSA key id: 0x58635D8F
4096 bit DH/DSS key id: 0x0784EFC5


__
Apache Interface to OpenSSL (mod_ssl)   www.modssl.org
User Support Mailing List  [EMAIL PROTECTED]
Automated List Manager[EMAIL PROTECTED]
__
Apache Interface to OpenSSL (mod_ssl)   www.modssl.org
User Support Mailing List  [EMAIL PROTECTED]
Automated List Manager[EMAIL PROTECTED]



Re: Certificate questions...

2000-03-03 Thread Brian Johnson

[EMAIL PROTECTED] wrote:

 Alex,,
  The trouble with using self signed certs is that you need to install the CA
 cert in the browser to stop messages popping up when you connect to the site -
 obviously no real problem as you will either be using them for testing or in a
 closed environment (or limited number of clients).  Using the 'Free Test
 Certificates' from thawte is a little better as the CA cert that they use to
 sign the CSR is already installed in Netscape (only 4.7x?).

are there any security benifits in buying a cert over making my own test certificate 
if I only have a few clients that will be accessing the site?  This site will be 
accessed by very few people, but security is quite importaint..
Thanks
-Brian

__
Apache Interface to OpenSSL (mod_ssl)   www.modssl.org
User Support Mailing List  [EMAIL PROTECTED]
Automated List Manager[EMAIL PROTECTED]



Re: Certificate questions...

2000-03-03 Thread Karl Denninger

On Fri, Mar 03, 2000 at 09:31:58AM +, [EMAIL PROTECTED] wrote:
 Alex,,
  The trouble with using self signed certs is that you need to install the CA
 cert in the browser to stop messages popping up when you connect to the site -
 obviously no real problem as you will either be using them for testing or in a
 closed environment (or limited number of clients).  Using the 'Free Test
 Certificates' from thawte is a little better as the CA cert that they use to
 sign the CSR is already installed in Netscape (only 4.7x?).
 
 Karl,
  To avoid this problem 'buy a cert' or install the CA cert into each browser
 (have a look at pkg.contrib/loadcacert.cgi)
 
 Mikey

That would be nice EXCEPT that Thawte and most of the others won't SELL a
cert to an indivdual except under "extraordinary circumstances".

--
-- 
Karl Denninger ([EMAIL PROTECTED])  Web: http://childrens-justice.org
Isn't it time we started putting KIDS first?  See the above URL for
a plan to do exactly that!

__
Apache Interface to OpenSSL (mod_ssl)   www.modssl.org
User Support Mailing List  [EMAIL PROTECTED]
Automated List Manager[EMAIL PROTECTED]



Re: Certificate questions...

2000-03-03 Thread Mike_Innes



Karl,
 Everything you say is true, and if you install a the CA certificate into
the browser then you will have the secure connection that you want, however if
you don't have the CA cert in the browser then the server that you are talking
to may not be who you then they are, so what? - this is the opportunity for a
'man in the middle' attack.

Instead of this:
 You - server
You may have this:
 You - 'man in the middle' - server

The man in the middle would make you believe that he is the server and he would
make the server believe that he is you.
Both https connections would be secure, but (here's the point) the man in the
middle would have the unencrypted data.  This is similar to a previous thread on
ADH.

On top of this, depending on your server and clients there may be more of a
headache trying to use strong encryption, if everything is 'domestic strength'
then that's not an issue.
Mikey




Karl Denninger [EMAIL PROTECTED] on 03/03/2000 15:39:23

Please respond to [EMAIL PROTECTED]

To:   [EMAIL PROTECTED]
cc:(bcc: Mike Innes/Virgin Direct/GB)

Subject:  Re: Certificate questions...




Hi John,

On Fri, Mar 03, 2000 at 10:06:19AM -, Airey, John wrote:
 Assuming we are talking about Thawte's server test certificates, they are
 only for use for one month. Using them helps you to understand how to
 install a real certificate without running the risk of destroying it (a very
 real risk with NT!)

Not really true.  You can set the validity up to 365 days.

 They are not intended for production use. Thawte's own certificates are
 accepted by all browsers (AFAIK) and prove to those who connect to your site
 that you are the company that you say you are. This is what you pay for, and
 if you ask me it's well worth the money.

 If you don't intend to connect your site to the outside world, you can make
 your own certificates anyway. The documentation to do that comes with
 openssl.

 John

I'm NOT using SSL for ecommerce so "proving" something is worthless to me.

My entire and sole use for SSL on my web server is to ENCRYPT TRAFFIC.  That
is, I don't CARE if someone believes I am who I say I am, but I very much
care that the CONTENT is not able to be picked off in transit.

For example, I receive faxes on my systems and store them in a private,
password-secured web directory.  By ensuring that any access to that
directory or its contents requires SSL, I ensure that nobody can pick off
the traffic in transit and SEE the faxes that I may view from a remote
location.  Since I use my fax system for things that I would consider
PRIVATE, this is important to me.

In this case I know damn well that I am who I say that I am, because I'm the
one connecting to the server.  My *ONLY* use for SSL here is to PROTECT THE
DATA, *NOT* certify ownership.

Likewise, I might want to make data available to another person that I (1)
want to password protect for them, and (2) want to make CERTAIN is not
compromised in transit.  HTTPS again does the job, but again, the
"certification" of who I claim to be is IRRELAVENT to the process.

There is NO WAY under the current paradigm that I've found to do this
without popping up warnings on every browser in existence.  This is a
severe and serious shortcoming in the SSL software in those browsers,
as not *EVERYONE* is interested in using SSL for Ecommerce where the
identity of the owner of the connection is important!

As it stands I'll buy a cert from Thawte if I can jump through their hoops,
but for some people it is inherently NOT WHAT THEY WANT TO DO in passing
encrypted traffic (eg: vetting that the sender is who they say they are).

In fact, for SOME potential uses of secure communication, it is absolutely
anathema that either end be positively identifyable in this kind of fashion.

This is something that you SSL folks need to look into finding a way to
resolve - perhaps a public "CA" similar to the MIT keyring for PGP keys is
called for here - a place where you can "sign" a key but not jump through
said hoops, yet keep the silly warnings off the user's computers!

--
--
Karl Denninger ([EMAIL PROTECTED])  Web: http://childrens-justice.org
Isn't it time we started putting KIDS first?  See the above URL for
a plan to do exactly that!
__
Apache Interface to OpenSSL (mod_ssl)   www.modssl.org
User Support Mailing List  [EMAIL PROTECTED]
Automated List Manager[EMAIL PROTECTED]










Internet communications are not secure. This message is confidential to the intended 
addressee. Any copying or distribution of it by anyone without the addressee's consent 
may be unlawful. If you are not the intended addressee, please inform us immediately 
and then delete this message. 

Virgin Direct Personal Financial 

Certificate questions...

2000-03-02 Thread Karl Denninger

Hi folks,

I have built the MODSSL package and Apache, and it works.  I got a
"test" certificate from Thawte (their "unauthenticated" one) and it
installed and worked properly.

Ok, so now I have "https:" support.

Except for one small problem - whenever I go to one of those pages, IE
throws up a dialogue box saying that the certificate is issued by a company
you have not chosen to trust.

I'm a *PERSON*, not a company.  While I do consulting, I'm not in this
for Ecommerce purposes and such - more for privacy and integration of
technology.

Thawte and Verisign are both set up for commercial users with DBAs, LLCs, or
corporate entities - things I simply don't have.

So how do I get a certificate that won't cause browsers to throw up chunks
whenever they are used?

Is it possible?

--
-- 
Karl Denninger ([EMAIL PROTECTED])  Web: http://childrens-justice.org
Isn't it time we started putting KIDS first?  See the above URL for
a plan to do exactly that!

__
Apache Interface to OpenSSL (mod_ssl)   www.modssl.org
User Support Mailing List  [EMAIL PROTECTED]
Automated List Manager[EMAIL PROTECTED]



Re: Certificate questions...

2000-03-02 Thread Alex C. Koch

Is getting one of these test certificate better than using a self signed 
test certificate that can be generated with openSSL?  I am currently using 
a certificate that I generated myself.  What would the advantages be of 
using a certificate from Thawte when it is not authenticated by them?


At 11:42 AM 3/2/00 -0600, you wrote:
Hi folks,

I have built the MODSSL package and Apache, and it works.  I got a
"test" certificate from Thawte (their "unauthenticated" one) and it
installed and worked properly.


Alex Koch
[EMAIL PROTECTED]
https://128.253.163.111 (SSL secured)
http://home.adelphia.net/~alexk

-- PGP Keys --
2048 bit RSA key id: 0x58635D8F
4096 bit DH/DSS key id: 0x0784EFC5


__
Apache Interface to OpenSSL (mod_ssl)   www.modssl.org
User Support Mailing List  [EMAIL PROTECTED]
Automated List Manager[EMAIL PROTECTED]