|
Nathan,
On 3/8/2017 12:35 PM, Nathan Andelin wrote:
Not sure that I agree that SMTP and Web Services don't care about CAs,
Same with true for web services. Web service clients and servers don't
mess
with certificate authorities. Why do browsers?
but...
where you could buy items with credit cards over the Internet.
send your credit card number to a criminal's web site. Sure, your card is
nicely protected as its sent, but if it's sent to a criminal, it's still a
big problem.
say you are. So if you claim to be www.amazon.com, the certificate
authority will not issue a certificate unless you somehow "prove" it. (They
might call Amazon's phone number, for example, or something similar...
depending on how serious they take it.)
sure that someone someone is intercepting the session and redirecting it
somewhere else.
You might say "but, nobody does that!" Yeah, and there's a reason... if
they did, it wouldn't match the CA, and so the customer would not be
fooled. You can bet that if SSL wasn't so picky about things, this would
be a common problem.
within an organization (vs. the public Internet).
dealing with. Or, with client-side certificates. Client-side certificates
are almost never used in SSL, but when they are the certificates are
typically used by whomever is running the server, since the purpose is to
make sure only people they allow to use the site can log in. So a public
CA where anyone can get a cert doesn't make much sense for client-side.
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2025 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.