Quote
Henrick Hellstr?m wrote:
> I think it does. Even if you act as your own root CA normal PKI
> operations will be an expensive investment. Discarding a root
> certificate completely means you have to redistribute the new root
> certificate to everyone in the system and issue new certificates to all
> end users.
In several circumstances, you DON'T want a certificate to be automatiocally
trusted as long as it's signed by a root CA. This is the case where each
application partner has his own certificate and where there simply is NO
valid CA. Think extranet, think commercial partner exchanges: in such cases,
you don't want to rely on certificate issued by either one of the partner
alone and you don't want to trust a third-party. In such a case, you
exchange certificate that are tied to a single purprose by a secure channel
(i.e. you get it on a CD, hand-to-hand).
Quote
> This is likely to cause a lot of annoyance in the
> organization.
In some case, you don't want any certificate to be accepted but a specific
one. And in these cases, using root certs as the trusting medium is both
akward and dangerous. In fact, in many cases, you'd rather not have a
central cert because it would increase the chances of missuse.
Quote
> If an end entity certificate is suspected to be
> compromised you'll only have to replace that certificate and add the one
> you discarded to the CRL, but that may cause the CRL to grow rapidly out
> of hand; not to mention that the person owning that certificate will
> have to re-encrypt/re-sign all data encrypted/signed by the discarded key.
Sure, but isn't that the whole point ? Beside, many cryptographic document
have a limited validity in time. After a quite short peridoe, they are not
valid any more.
Quote
> Not even exchanging a personal PGP key is without cost, because you have
> to spend a lot of time making people trust it (meeting people in person,
> exchanging keys and have them forward your key through the web of trust).
Compared with the cost of a hardware device, this cost is negligeable. In
practice, people put their public key on public key servers, in their
finger profile or in their Email .sig. Sure, it's not a "good" way to do it,
but it's the way it's done. And adding crypto hardware wouldn't improve
that anyway because you'd still have to decide which key to trust and which
one not to.