On 13/10/2009 15:54, Gervase Markham wrote:
Firefox uses OCSP but, by default, any response other than a definite
"is revoked" response is treated as "is not revoked". There is a user
pref that allows the user to change that, so that any response other
than "is not revoked" is treated as "is revoked".

IMO, we need to be smarter about that.
Here's a straw man:


My view: I would defer any "smarter" things that reduce customer usability until (a) everyone has OCSP really well worked throughout, end-to-end ... and (b) we see some actual evidence that suggests that the risk of an OCSP interference is something worth worrying about.

By far the number one threat to PKI is denial of service. That is, it denies service to users, and users go elsewhere, and are then unprotected. As the number one threat that PKI could help with is secure browsing, if it was widely deployed, and secure browsing is resulting in billion dollar losses ... it is far more important to spread usage of certificates than to make them secure against imagined and theoretical bogeymen.

That's just me :)

iang

OK:
200 response with OK
No response (network problems)

Not OK:
200 response with revocation
400 response (OCSP responder actively denying response)
500 response (OCSP responder broken)

What do people think? Putting 400 and 500 in "not OK" makes it harder to
inject a failure in order to get Firefox to pass a cert. Although one
can still inject an OCSP tryLater <sigh>.

Gerv

--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to