Robot certificate authority
This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these template messages)(Learn how and when to remove this template message)
Typically Robot CAs are set up to validate that the public key belonging to an e-mail address does actually belong to the e-mail address. This is achieved by the Robot CA signing each uid on the public key and sending the signed copy to the e-mail address, encrypted with the public key. If the public key belongs to whoever reads the e-mail address, they receive the signed copy, can decrypt it and then publish it to the public key servers. If the public key does not belong to whoever reads the e-mail address, they are unable to decrypt the encrypted key, but the accompanying message gives them sufficient information to let them know that someone is attempting to impersonate them.
Robot CAs are considered significantly less secure than other CAs, which typically require multiple forms of photograph identification. In particular most robot CAs are only as strong as the underlying e-mail infrastructure: anyone who can read another person's mail can impersonate them and anyone who can read and delete another person's e-mail can get the signature without the person knowing if they don't read their e-mail at exactly the right time or the impostor prevents the signature e-mail from being seen. Robot CAs also offer no evidence as to the real identity of an OpenPGP user, merely their e-mail address. All well behaved Robot CAs use a signature policy URL, which is the URL of the policy under which the keys are signed.
A Robot CA also has the side effect of serving as a time stamp server for keys because a time stamp is included in the signature added to the key. The signature is evidence that the key existed and was in use at a certain point in time.
Free Robot Certification AuthoritiesEdit
- CAcert (Offers only verified signatures, not a true robot)
- JamesHoward.us Robot CA (out of order)
- Toehold (Kyle Hasselbacher) (domain expired)
- Imperial Violet (Adam Langley) (out of order)
- PGP Corporation email verification service
- CAcert (Supports both SSL & OpenPGP, on any software or hardware. At the moment, is not accepted by either Firefox or Internet Explorer)
- StartSSL (Basic certificates are free, others cost.)
- CertifyID Certificates (Only Internet Explorer is supported running on a Microsoft operating system.)
- Comodo (Supports all major Browser, email certificates are free, others cost)