On 01/30/2009 01:25 PM, Jean-Marc Desperrier:
Paul Hoffman wrote:
[...]
That feels insufficient to me. I also disagree that there are
"practical problems of revoking a very large number of certificates".
The worst problem is that the CRL will grow; that's no big deal, it
is supposed to grow.

You *obviously* never had to handle this CRL :
http://onsitecrl.certplus.com/DIRECTIONGENERALEDESIMPOTSDIRECTIONGENERALEDESIMPOTSUSAGER/LatestCRL


Jean-Marc, I can't hold back but must tell you that these are clear failures of the CA to assess and plan its infrastructure correctly, assess its design and provide adequate security. A CRL with the size of 34 MB is simply useless - it's like having no CRL and no way to revoke certificates.


Java programs just can't take it up. And J2EE is by far the most popular
application server architecture nowadays. 64 bits J2EE with an
enterprise level stability is not a reality today.

And just count how many 3% of the certs Verisign issued under it's main
CA makes.

If the CA doesn't take measures which enables it it revoke 3% of issued certificates, then the infrastructure isn't up to its task. The EV guidelines for example requires ongoing or yearly security planning where issues like this must be addressed. Simply refusing to revoke the certificates is simply not dealing with the issue.

There are various ways a CA can deal with this - even in case of Verisign and other CAs which issue a lot of certs. Not doing so is negligence either way, not revoking those weak and potentially compromised keys or letting CRLs grow to non-proportional sizes.


--
Regards

Signer: Eddy Nigg, StartCom Ltd.
Jabber: start...@startcom.org
Blog:   https://blog.startcom.org
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to