[sclug] Re: [dev-crypto] SMIME Opinions

Will Dickson wrd at glaurung.demon.co.uk
Mon Nov 29 15:21:14 UTC 2004


Rodney.A.Madden at syntegra.com wrote:
> 
> 
> Our company is planning on implementing an SMIME service. The
> service will allow individuals and organizations within the company to
> sign and encrypt outbound documents/emails.
> 
> The certificates for partners will be stored, with other info, in an
> LDAP directory. The LDAP directory also has an entry for every
> organization and person in our company.

I'd have concerns about privacy and applicable data 
protection laws (if any), but assuming you've worked all 
that out, this sounds like a good idea.

> 
> The current directive is that all private/public keypairs for individuals
> and organizations within our company will be stored  in the LDAP
> directory. 

This sounds like a really bad idea. I'm not an LDAP expert, 
but isn't the idea of LDAP to provide *access* to data? 
Whereas the whole point of private keys is that they should 
be kept private, ie. secret?

There is always a tradeoff between keeping a secret secret, 
and keeping it safe: a secret that nobody knows is very 
secret, but not much use, whereas a secret that lots of 
people know is unlikely to be lost, but isn't much of a 
secret either. IMHO this proposal is not a good answer to 
this dilemma.

If I had to come up with a counter-proposal, I'd keep the 
certs on the LDAP server, but keep the private keys on the 
users' personal workstations, with a suitable offline backup 
regime to ensure against loss of the private keys. Something 
like putting each key onto eg. a writable CD and putting all 
the CDs into a safe ought to do it.

Sorry this doesn't answer your question, but I hope it's of 
some use anyway.

Will


More information about the Sclug mailing list