On 01/09/2009 12:15 AM, Nelson B Bolyard:
It requires that CAs NEVER "forget" about any certs they previously
issued, not even after they expire.  It means that a CA's list of revoked
certs will grow boundlessly.  It makes CRLs become impractically big.

Well...StartCom NEVER removes a certificate from the CRL once revoked. That's because people tend to view expired certificates as an annoyance, not critical. However a revoked certificate should never be accessible anymore. (Just think about the mozilla.com certificate. I bet that the majority would click through that certificate in case of "expiration", whereas they can't because of revocation. There is an inherent difference between the two).


CACert tried that once.  They had a multi-megabyte CRL (maybe they still do).


We manage however intermediate CA issuers per class and purpose, hence the CRLs stay relatively small. The intermediate CAs are valid for five years, whereas after the fourth year a new issuer takes over (leaving the fifth year for revocations only). That's perhaps another good practice...besides that, OCSP hasn't the draw-back of large downloads anyway - and Firefox doesn't use CRLs really.

--
Regards

Signer: Eddy Nigg, StartCom Ltd.
Jabber: start...@startcom.org
Blog:   https://blog.startcom.org
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to