up/home

X.509-formatted public encryption/signing keys can either be self-signed or signed by a Certificate Authority (CA) which certifies the identity of the keyholder to some extent. The keys of many CAs are embedded in web browsers and distributed with TLS-enabled (SSL is the old standard) applications. Like all public cryptography keys, the keys of CAs should be verified by confirming their fingerprints with the keyholders. Browsers that have such CA keys embedded in them are usually not distributed securely, which makes the keys effectively unverified and leaves the browser itself open to being trojaned. Other applications that distribute CA's keys often do so without verifying, or even providing information on how to verify, the keys. Also, many software vendors include the keys of some CAs but not others. The following is a list of several CAs, their keys/certificates/revocations, and their contact information, to make verifying their public keys easier.

name (primary country, note):

--
Jason Harris

up/home


$Date: 2004/11/15 23:11:19 $