On 10/24/2008 12:54 AM, Julien R Pierre - Sun Microsystems:
If a root ended up being compromised and we heard about it, I can assure
you that we would produce a new NSS release with an update root cert
module with all due haste - meaning probably within a couple of business
days.

Under certain circumstances that's a long time. But I wasn't talking exclusively about current releases of NSS and Mozilla products (about which I'm pretty familiar with and the expected time frame to push out an emergency release), I was rather talking about

- software that uses NSS but isn't a product of Mozilla
- other libraries

How to reach them within a reasonable useful time? I guess controlling that on the software level is problematic. For one, I'd expect MS to be fastest under such circumstances - at least for those that update their OS....same for other supported operating systems (like Red Hat), but a lot slower for applications which ship the crypto library (like NSS) as part of their software.

There was a time where CRLs for EE certificates updated every two weeks or so, something which these days sounds absolutely insufficient. OCSP seems to be a lot more responsive (caching is usually limited to one day - at least for NSS), but still...time is of essence under such circumstances. I think that the current options at the hand of CAs are limited to say the least.

Just imagine that one of the roots in NSS would have been affected by the Debian fiasco - pretty much anybody out there could have played CA...for days, maybe weeks, maybe beyond. That's scary.

--
Regards

Signer: Eddy Nigg, StartCom Ltd.
Jabber: [EMAIL PROTECTED]
Blog:   https://blog.startcom.org
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to