From: “Philip L. Karlton” <karlton@netscape.com>
To: Sam Quigley <osquigle@midway.uchicago.edu>
Message Hash: 5c3e3e09026baa27af81a992021dac5aa1c01c5f673388707f5786ae90b7dbb4
Message ID: <327E8B63.1D5C@netscape.com>
Reply To: <Pine.GSO.3.95.961103231441.3151I-100000@kimbark.uchicago.edu>
UTC Datetime: 1996-11-05 00:35:04 UTC
Raw Date: Mon, 4 Nov 1996 16:35:04 -0800 (PST)
From: "Philip L. Karlton" <karlton@netscape.com>
Date: Mon, 4 Nov 1996 16:35:04 -0800 (PST)
To: Sam Quigley <osquigle@midway.uchicago.edu>
Subject: Re: free SSL CAs?
In-Reply-To: <Pine.GSO.3.95.961103231441.3151I-100000@kimbark.uchicago.edu>
Message-ID: <327E8B63.1D5C@netscape.com>
MIME-Version: 1.0
Content-Type: text/plain
Sam Quigley wrote:
>
> I've set up my own CA, and given myself my own cert., but having the same
> server you're interacting with being the one that's the CA for the
> transaction leaves the setup open to man-in-the-middle attacks (I'd think,
> at least...).
It's up to the user (at least with the Netscape Navigator) to decide
what CA certificates or particular server certificates to trust.
Self-signed certificates are logically at the root of any certificate
chain.
PK
--
Philip L. Karlton karlton@netscape.com
Principal Curmudgeon http://www.netscape.com/people/karlton
Netscape Communications Corporation
Everything should be made as simple as possible, but not simpler.
-- Albert Einstein
Return to November 1996
Return to “Sam Quigley <osquigle@midway.uchicago.edu>”