>>
>> In summary, we have to be careful about 'doing something because it just
>> seems right'. We need to truly understand the risks, and what we are
>> getting for those risks.
>>    
>
> Bob, a way to mitigate attacks on OCSP responders (DOS) can be
> mitigated to by also supporting CRLs at multiple locations. Also we
> considered already multiple different locations for OCSP responders,
> I'm not sure if NSS (and other software) would support that.

NSS has supported preloaded CRL, but it treats that separately from OCSP
(it always checks the CRL if it's loaded, it never fetches the CRL. OCSP
is still interegated with the same semantics as if the CRL didn't exist.

As of NSS 3.12, the libpkix code has a much more flexible plan for
revocation. It can fetch OCSP, CRL, or both. It can work down the list
and stop when it gets an answer (either revoked or not), and it can be
configured to require an answer from one of the sources. I believe as of
the most recent release of NSS it can also fulfill such requests from
it's cache (which is a big win when dealing with intermediates). The CRL
fetching on the fly is a relatively recent addition. I don't believe it
deals with multiple OCSP servers, but alexi could answer that question.

Currently mozilla products only use libpkix when validating EV status.

This, of course, only helps if the CRL and OCSP servers are on different
hosts with different hostnames, preferably even different domain names.
The proxied case isn't solved, but anyone owning a proxy has a much
easier DoS than preventing OCSP and CRL fetching;).

bob


-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to