21.03.2013 Views

Problem - Kevin Tafuro

Problem - Kevin Tafuro

Problem - Kevin Tafuro

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

people are going to trust it, so this can have disastrous effects if your key is compromised.<br />

Anyone with access to your private key will also be able to decrypt email that<br />

has been encrypted with your public key. Sure, your certificate can be revoked, but<br />

as we discussed earlier, revoking a certificate does not have any effect if its revocation<br />

status is not being checked. With this in mind, particularly for mobile users, we<br />

highly recommend that you choose high security.<br />

Finally, you should read and must accept VeriSign’s subscriber agreement and privacy<br />

policy. If you are using Microsoft Internet Explorer and you checked the checkbox<br />

for securing your certificate, a dialog will be presented to you to select the<br />

security level that you want to apply to the certificate. Within an hour or so, you will<br />

receive an email from VeriSign at the address you entered into the enrollment form<br />

containing instructions on how to “pick up” your certificate from VeriSign. Included<br />

in the email are a URLand a PIN, both of which you’ll need to get the certificate<br />

from VeriSign. You should use the same machine and browser to retrieve the certificate<br />

as you did to request it.<br />

That’s all there is to it! Once you have retrieved your certificate from VeriSign, follow<br />

the directions presented on VeriSign’s site to make use of the certificate in either<br />

Netscape or Microsoft Internet Explorer. Again, if you are using other software to<br />

access your email, follow the vendor’s directions to enable the certificate. Now you<br />

are ready to start sending and receiving secure email!<br />

Code-signing certificates<br />

VeriSign offers code-signing certificates for use by software developers and software<br />

vendors. The purpose of such certificates is to sign your code that users download<br />

from the Internet. By signing your code, users can be assured that the code has not<br />

been tampered with or corrupted since it was digitally signed with your certificate. In<br />

the online world, where people are not only becoming increasingly aware of security<br />

issues but also worry about viruses and worms, signing your code provides a certain<br />

assurance to your users that they are getting the software they are expecting to get.<br />

Obtaining a code-signing certificate is not nearly as quick and easy as obtaining a<br />

personal certificate. Code-signing certificates are also considerably more expensive,<br />

but then again, they are not really intended for everyday individual users. At the time<br />

of writing, VeriSign offered six different types of code-signing certificates for various<br />

types of programs. You must be sure to get the proper certificate for the code that<br />

you wish to sign, because the different types of certificates may not work properly<br />

with other types of code. For example, Microsoft Authenticode certificates only work<br />

for Microsoft’s Internet Explorer browser. For Netscape browsers, you need to get a<br />

Netscape Object Signing certificate. The available types of code-signing certificates<br />

are listed as part of the process of obtaining a code-signing certificate, and you must<br />

choose a type as the first step in obtaining a certificate.<br />

516 | Chapter 10: Public Key Infrastructure<br />

This is the Title of the Book, eMatter Edition<br />

Copyright © 2007 O’Reilly & Associates, Inc. All rights reserved.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!