1995-10-01 - Re: NetScape’s dependence upon RSA down for the count!

Header Data

From: Don.Stephenson@Eng.Sun.COM (Don Stephenson)
To: jbass@dmsd.com
Message Hash: 033c17e72d7f48ff942da4302816ed6c7c509f4b61334611ea4c1544ffdc3f80
Message ID: <9510010024.AA08498@icenine.Eng.Sun.COM>
Reply To: N/A
UTC Datetime: 1995-10-01 00:33:59 UTC
Raw Date: Sat, 30 Sep 95 17:33:59 PDT

Raw message

From: Don.Stephenson@Eng.Sun.COM (Don Stephenson)
Date: Sat, 30 Sep 95 17:33:59 PDT
To: jbass@dmsd.com
Subject: Re: NetScape's dependence upon RSA down for the count!
Message-ID: <9510010024.AA08498@icenine.Eng.Sun.COM>
MIME-Version: 1.0
Content-Type: text/plain



Yes, but the certificate that contains the public key of the server 
is digital signed by the certificate authority (CA).

To create such a certificate requires the secret key of the CA.

The public key of the CA is contained in the client software, which 
uses it to verify the validity of the server certificate.

- Don 


> From jbass@dmsd.com Sat Sep 30 17:15:36 1995
> Date: Sat, 30 Sep 95 16:50:05 -0600
> From: jbass@dmsd.com (John L. Bass)
> To: www-security@ns2.rutgers.edu, cypherpunks@toad.com
> Subject: Re: NetScape's dependence upon RSA down for the count!
> 
> 
> Ok ... one more time ... the filter has to replace the client/server
> keys in the packet stream with it's own ...
> 
> John
> 
> 





Thread