>> Personally, I assume root CA private keys of any CA vendor are owned by
>> the NSA anyway.
> 
> There's no rule that says you have to use a "root CA" signed certificate
> for your TLS connections.

Sure, in theory, but there are multiple practical problems when using
self-signed certs or certs signed by a CA not built into browsers. As a
starter, here are 3:

- enterprise networks might block those right away with no way for the user
to accept self-signed or import alien CA certs
- the user experience is bad: Firefox scares with dialogs and multiple steps
of overcoming those
- with WebSocket, browers will not even show a dialog! WebSocket are so
called "subresources", and browsers will never render dialogs for these

So in practice, I _have_ to use a CA that is built into all major browsers.

/Tobias

> 
> Jean-Paul
>> Really, TLS is broken.
>> 
>> We need a new scheme. For encryption session keys, Diffie-Hellman is
>> available, and provides perfect forward secrecy naturally.
>> 
>> For authentication, we need a peer-based system like PGP has, not
>> relying on centrally managed trust.
>> 
>> I know. Not going to happen any time soon ..
>> 
>> /Tobias
> 
> _______________________________________________
> Twisted-Python mailing list
> Twisted-Python@twistedmatrix.com
> http://twistedmatrix.com/cgi-bin/mailman/listinfo/twisted-python
> 


_______________________________________________
Twisted-Python mailing list
Twisted-Python@twistedmatrix.com
http://twistedmatrix.com/cgi-bin/mailman/listinfo/twisted-python

Reply via email to