I am not familiar enough with the protocol to answer this question:
is it possible for an evil SSL server to send packets such that it
ends up with an arbitrary signature from a client? I'm trying to
emphasize the importange of keyUsage bits. :)
This is not possible without unreasonable
so they could approve software in house.
- Tim
Tim Dierks
VP of Engineering, Certicom
[EMAIL PROTECTED]
510.780.5409 [Hayward] -- 905.501.3791 [Mississauga]
have
CRL distribution point extensions, so certificates cannot, in practice, be
revoked.
Tim Dierks
VP of Engineering, Certicom
[EMAIL PROTECTED]
510.780.5409 [Hayward] -- 905.501.3791 [Mississauga]
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On
Behalf
We've taken down the page until I can make sure that we're enforcing the
appropriate export controls. Hopefully, it will return real soon now.
Tim Dierks
VP of Engineering, Certicom
[EMAIL PROTECTED]
510.780.5409 [Hayward] -- 905.501.3791 [Mississauga]
-Original Message-
From: [EMAIL
in OpenPGP
formats for the messages, or ECC S/MIME). If someone would be interested in
working on Secure MemoPad, you can contact me.
- Tim
Tim Dierks
VP of Engineering, Certicom
[EMAIL PROTECTED]
510.780.5409 [Hayward] -- 905.501.3791 [Mississauga]
-Original Message-
From: [EMAIL