Jan Schejbal:
> Akamai, a very big content distribution provider used by MANY
> organisations including the german Finanzamt (equivalent to the IRS),
> had a weak key. If I put
> 127.0.0.1 a248.e.akamai.net
> into my hosts file and run an apache with the broken cert (key got
> published in some forums), I can use firefox 3 to connect to
> https://a248.e.akamai.net (which is my local machine) without any
> warnings.

I checked the certificate of the domain mentioned above and it doesn't 
use a weak key due to the Debian bug.

However it does succeed perhaps because this CA doesn't operate an OCSP 
service (or there is no OCSP service URL in the certificate) and you 
haven't imported the CRL from that CA (Firefox should really fetch CRLs 
automatically).

> The RSA blacklists for 1024 and 2048 are 12.8 MB total in
> uncompressed ASCII format,

Shipping NSS with another 12 MB has been ruled out so far. See 
https://bugzilla.mozilla.org/show_bug.cgi?id=435082

>
> My suggestion: Issue a FF3 update ASAP that includes (or downloads) the
> blacklists, and shows a warning if a server uses a vulnerable cert.
> Consider that it is possible that stupid admins forgot to change the
> certs (so the warning MAY be shown on legitimate sites), but it is also
> possible that a site already using a new cert gets MitM-ed with an old
> cert.

A much better solution would be to fetch the CRLs by default. At least 
80% of the CAs in NSS have publicly committed to get rid of the affected 
keys in this way or the other, all of them using OCSP responders. For 
the remaining CAs the situation isn't clear yet and CRLs aren't fetched 
automatically.


-- 
Regards

Signer: Eddy Nigg, StartCom Ltd.
Jabber: [EMAIL PROTECTED]
Blog:   https://blog.startcom.org
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to