CAcert.org
From Wikipedia, the free encyclopedia
CAcert.org is a community-driven certificate authority that issues free public key certificates to the public[1] (unlike other certificate authorities which are commercial and sell certificates). CAcert has over 100,000 verified users and has issued over 300,000 certificates as of March 2008[2].
These certificates can be used to sign and encrypt email, authenticate and authorize users connecting to websites and secure data transmission over the Internet. Any application that supports the Secure Socket Layer (SSL) can make use of certificates signed by CAcert, as can any application that uses X.509 certificates, e.g. for encryption or code signing and document signatures.
Contents |
[edit] Robot CA
CAcert automatically signs certificates for email addresses controlled by the requester and for domains for which certain addresses (such as "hostmaster@example.com") are controlled by the requester. Thus it operates as a robot certificate authority. These certificates are considered weak because CAcert does not emit any information in the certificates other than the domain name or email address (the CommonName field in X.509 certificates).
[edit] Web of trust
To create higher-trust certificates, users can participate in a web of trust system whereby users physically meet and verify each other's identities. CAcert maintains the number of assurance points for each account. Assurance points can be gained through various means, primarily by having one's identity physically verified by users classified as "Assurers" or by "Trusted Third Parties" such as public notaries.
Having more assurance points allows users more privileges such as writing a name in the certificate, longer expiration times on certificates. A user with at least 100 assurance points is designated an Assurer, and may verify other users; higher assurance points allows the assurer to assign more assurance points to others.
CAcert sponsors key signing parties, especially at big events such as CeBIT.
[edit] Inclusion status
As of 2005, certificates issued by CAcert are not as useful in web browsers as certificates issued by commercial CAs such as VeriSign, because most installed web browsers do not distribute CAcert's root certificate. Thus, for most web users, a certificate signed by CAcert behaves like a self-signed certificate. There was discussion for inclusion of CAcert's root certificate in Mozilla and derivatives (such as Mozilla Firefox) but it was closed without including it, at the end of April 2007.[3] This was after an audit was suspended in December 2006 because CAcert needed to improve their management system. There has been progress toward this and a new request for inclusion may be expected in the future.[4] Getting the CAcert root cert included into Mozilla is indeed probably their largest challenge right now[who?], but one they are actively engaged in.[5] CAcert is engaged to give more transparency in its management system.
The following operating systems or distributions include the CAcert root certificate: [5]
- CentOS
- Debian
- FreeBSD
- Gentoo
- Knoppix
- Internet Tablet OS (installed on Nokia Internet Tablets)
- MirBSD
[edit] See also
- Thawte - Also provides free personal certificates under a web of trust[6]
- Comodo - Free personal certificates for personal use (no verification of identity)
[edit] References
[edit] External links
- CAcert International
- Unofficial FAQ
- Assurance Details
- IRC channel #cacert on irc.cacert.org ([1])
- Contact Form on www.cacert.org
- CAcert Austria (in German)
- CAcert Hungary (in Hungarian)
- german CAcert-Support Forum (in German)
- GSWoT - CAcert assurers organized to provide and promote PGP key signing
- audit, todo for audits