On Sun, Jun 8, 2008 at 5:21 AM, Michael Ströder <[EMAIL PROTECTED]> wrote:
> Andrews, Rick wrote:
>>> That strikes me as a policy that one might describe as "attacker
>>  friendly".
>>> I suggest: revoke first, contact later.
>>>
>>> When you revoke the certs, you're protecting your relying parties, and
>>> you can count on your relying parties to contact the subjects whose
>>> certs have been revoked. :)
>>
>> That's a good question, and I don't know the answer. I'll bring it up
>> with the business folks to decide what we should do.
>
> I fear that your business people will only look at the customers'
> (subscriber) side. But as a relying party I'd want that certs for weak
> keys are revoked in any case.

My thought is that if there's any knowledge that a CA has that a key
has been compromised, the CA can no longer verify the binding of the
key to the subject -- which means that the certification should not
exist, and thus must be revoked.

Then again, I'm something of a 'purist' when it comes to viewing what
a CA's responsibilities are.

How much does it cost the CA to mint a new certificate?  How much
liability does the CA assume in the case where a subject's certificate
is used by someone other than the subject through no real fault of the
subject's?

(This is one of the reasons why I don't believe it's viable to charge
per-certificate, but rather per-timeperiod.)

-Kyle H
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to