IMO putting OCSP or CRLs in public SSL certificates was never a
particularly good idea because the only likely case for a revocation
is when a CA fails to validate a customer.  That has happened
but not often enough to motivate the building of new infrastructure.

It seems like an easier way to just roll your own certs if you want
to screw somebody because it is a fairly risky business exposing
your identity when you are in a fraudulent mode :-)

Somewhat related: It seems that few VPNs perform verification
checks except during login which casts a certain shaddow over
the verification concept for mobile devices.

-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to