Date: Sun, 07 Jan 2001 14:46:19 -0700 From: Wes Peters <wes@softweyr.com> To: Garrett Wollman <wollman@khavrinen.lcs.mit.edu> Cc: Robert Watson <rwatson@FreeBSD.ORG>, security@FreeBSD.ORG Subject: Re: Fw: Re: Antisniffer measures (digest of posts) Message-ID: <3A58E3AB.1117EF2D@softweyr.com> References: <E14FFLX-0003ok-00@smtpout.kingston-internet.net> <Pine.NEB.3.96L.1010107111516.27948D-100000@fledge.watson.org> <200101071925.OAA04427@khavrinen.lcs.mit.edu>
next in thread | previous in thread | raw e-mail | index | archive | help
Garrett Wollman wrote:
>
> <<On Sun, 7 Jan 2001 11:21:16 -0500 (EST), Robert Watson <rwatson@FreeBSD.ORG> said:
>
> > an SSL telnet does offer something that SSH does not have: the ability to
> > connect to a new host without a manual keying procedure.
>
> Some people would say that this is a liability. I've got a number of
> particularly argumentative users here who insist that trusted third
> parties of any kind are fundamentally bad. While I don't necessarily
> agree, it is true that in any X.509 configuration it is necessary to
> be very careful about which CAs one trusts and for which purposes.
> (For our SSL applications here, we will only trust our own CA, since
> it is the only one capable of authenticating our users.)
Amen. The idea of a single large CA that can be trusted for everything
is ludicrous, the stuff business plans are made of.
Like ssh, the X.509 certificate mechanism is a tool that must be used
properly to function. Pounding nails with a jewelers screwdrive isn't
and effective activity either.
--
"Where am I, and what am I doing in this handbasket?"
Wes Peters Softweyr LLC
wes@softweyr.com http://softweyr.com/
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3A58E3AB.1117EF2D>
