Some things that I picked up:
- Different CA's can provide you with SSL certificate for same URL (or whatever)
- Internet Explorer (actually the Windows crypto) downloads extra CA's dynamically; so the list you see in IE can grow behind the scenes
- Firefox manages the list of trusted CA's itself
- There is no standard policy for when a CA is accepted by browser vendors
- The list of trusted CA's should be based on your geographical location
- Trusting a CA is somewhat equivalent to trusting a government
- Browser should provide (advanced) users with extra features to help them decide if CA certificate should be trusted or not
- Configure single CA (or self-signed) cert to be trusted for specific outbound connection (e.g. when business partners have defined their "own CA")
- Different SSL client certificate per outbound connection
- Easy configuration revocation checks (OCSP etc); and checking if the revocation checks actually work
- Different timeout settings per connection
- Only accept SSL connections on specific interfaces
No comments:
Post a Comment