OpenPGP certificate verification for TLS connections [Was: Re: [Help-gnutls] Re: Semantics of `gnutls_openpgp_key_check_hostname ()']
Rupert Kittinger-Sereinig
rks at mur.at
Sat Apr 14 01:10:54 CEST 2007
Hi folks,
I have followed this thread and I would like to add a different
perspective. What is wrong with X509 certificates? I will try to put my
view in nutshell:
X509 certificates mix up two concepts: who is the owner of this key, but
also: what is he allowed to do? To handle these tasks for all use cases,
people have developed lots of complicated rules, then vendor-specific
extensions. The result is a mess, to put it mildly.
From a design point of view, I think it would be a good decision to
keep user identity and user privilege management separated. OpenPGP can
be used for the first task, but the second task is probably very domain
specific.
One example: a secure messaging service could have millions of users. A
gnupg keyring of this size may be a bit problematic, but a database
should handle this easily. To validate a client connection in this
scenario, we would need to:
- check for a trusted signature (including expiry and revocation), we
can keep this as simple as checking for one trusted key if we want.
- now that we know the ID is authentic, we can look it up in the
database and decide what the client is allowed to do.
As for he content of ids, I agree with Daniel: using URIs seems the
logical choice to me, at least for servers.
cheers,
Rupert
--
Rupert Kittinger-Sereinig <rks at mur.at>
Krenngasse 32
A-8010 Graz
Austria
More information about the Gnutls-help
mailing list