Julien R Pierre - Sun Microsystems:
Eddy,

Eddy Nigg wrote:

That's entirely and implementation issue and design approach.

No. It is also an issue of PKIX standards as well. CAs should not implement revocation mechanisms that are not standard, and expect them to be supported by general-purpose software like NSS/Mozilla.

Yes correct! Perhaps I should have suggested, that it would be interesting to have such an approach working in some form because the CA could react the fastest for all applications which would implement that approach. It could be a different key under the CA control or something else as a first defense (but not on the application level like NSS).

My concern is, that reaching all applications, libraries and users which don't upgrade/update regularly (if at all and very late) is very difficult to accomplish. Instead, a revocation mechanism under the CAs control (and perhaps out of reach, with special controls in place) would be more efficient.

> If the root could "revoke itself", in the case of root cert key
> compromise, ie. the root cert's private key becoming public, anybody
> could then sign revocation information for that root CA - whether to
> mark it revoked or unrevoked.

Correct, however the CRLDP is included in the original certificate which is embedded into the software. This information isn't going to change. It would require at least a DNS compromise on the subject BEFORE the root would be marked revoked. I guess there could be different approaches for the application in having the root revoked at the first possible opportunity.

In any case, the suggested best practice is to refrain from issuing directly from the CA root and issue from intermediate CA certificates instead. Everything remains under the CA control, including revocation. Damage would be limited and controllable in such a case and that's another reason why issuing directly from CA roots is under the problematic practice charter: https://wiki.mozilla.org/CA:Problematic_Practices#Issuing_end_entity_certificates_directly_from_roots


--
Regards

Signer: Eddy Nigg, StartCom Ltd.
Jabber: [EMAIL PROTECTED]
Blog:   https://blog.startcom.org
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to