Ben,

Ben Bucksch wrote:
With OCSP, it's not a problem anymore, because the question is "is *this* cert still valid?" not "tell me all revoked certs".

No, the question OCSP asks is not that . It is "is this cert revoked, as of the current date" ?

Note that OCSP does not allow revocation checks for date prior to the current date (whether of not that makes sense without secure timestamps, is another discussion). CRLs do.

The OCSP responder is also allowed to forget about the revocation status of any cert that's outside its validity period.

For more info on this, see RFC 2560, section 4.4.4, "Archive cutoff".

It requires that CAs NEVER "forget" about any certs they previously
issued, not even after they expire.

They get paid for it, for each cert. Hotmail and Yahoo also never forget the email addresses that were issued (they may get deactivated, but the account still exists), and it's not even a paid service.

Nevertheless, the X.509 and PKIX standards don't require them to remember revocation status after cert expiration. It is allowed, but not required.

I heard that the Archive cutoff extension was also allowed for CRLs, but I haven't found any reference that confirms that.


       This is what GPG
does, too. This shows us that the new key is authorized by the old
       owner, so continuity is maintained.

So, after a key is compromised, it remains desirable that replacement keys
are authorized by a signature made with the compromised key?

Yes. It - at worst - means that either rightful owner or the attacker endorses the new key, reducing the candidates from the whole world to two. The CA needs to approve the new key as well, though, so the attacker has to gain *both* the old private key and get the approval of the CA.

Sorry, but that just doesn't make sense. And old keys can and do get lost all the time.

More importantly, it helps the normal situation that a the owner decides to use a new key, for whatever reason, and prevents a spurious warning for users in that case.

When someone chooses to use a new key, they can simply get a new certificate containing the public key and get it signed by the CA. There doesn't need to be any spurious warnings for anybody.

The warning, in turn, ensures that you cannot just walk to *any* CA, without any connection to the victim site, and get a valid cert. It *has* to be signed by the private key, which means the attacker *has* to break into my systems.

You could also solve that problem by having only one trusted root, or having roots that use name constraints. Then everybody would have only one CA they could go to. That actually fits with x.500 pretty well. But of course that would mean the end of competition between CAs, and it would be a bad thing.

This means that if I can manage to keep my systems secure, there's really no way an attacker can get between me and my existing users / communication partners. This is as secure as it gets. (If an attacker breaks into one of the partners' systems, all bets are off, in any system.)

Given what we know about warnings and how they are ignored by most users who don't understand them, I certainly wouldn't put too much faith into that !

Having roots with name constraints would be much more secure - since you couldn't have other CAs issuing valid certs for your identity.

No, because the content of all extensions are included in the computation of the signature.

Can we create another extension? The signature itself is a shell around the certified bits. Add the second signature around that first signature.

There must be a way to add signatures. It's a base feature in PGP! If it's entirely impossible to have two signatures, and no way to add it to the spec, that's a design error. It's hard to believe that it's so limited.

If one wanted to have another signature, it wouldn't be as an extension, since, as Nelson pointed out, extensions are part of what gets signed. The current single signature is not an extension.

Well, I guess somebody did it anyway :
http://www.freepatentsonline.com/y2008/0270788.html

sigh.
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to