On 02/23/2012 11:52 AM, Kai Engert wrote:


As soon as the certificate has been revoked, the domain owner is able to obtain an OCSP response for the rogue certificate. The domain owner could configure their server to include this OCSP response in all TLS handshakes, even though this OCSP response is unrelated to the server certificate actually being used.

If clients had a persistent OCSP cache, in particular bundled with a persistent OCSP cache for all revocation events, then users/clients could potentially learn about important revoked certificates in advance, for the servers they frequently visit.

So I had some initial issues with this, until I realized by domain owner you mean the owner of the domain being spoofed by the OCSP response.

The tricky thing here is identifying the cert that was revoked. Unless the CA actively pushes the results of revocation out to the domain owner, their is no way the owner will know from a random OCSP or CRL that a given revoked cert was from their domain.

This also doesn't help if the rogue certificate happens to be an intermediate.

Not that the idea is without merit, we just need to make sure we understand the limitations.

bob


Servers could be allowed to contact (daily) each of the publicly known CAs. The server could ask "do you know about any revoked certificates for my server's hostname?". Assuming the CA has a database of their incorrectly issued certificates, it could lookup the affected certificates, produce a revocation OCSP response for each of them, and send them back to the server. This way, information about compromised certificates could be distributed automatically, only between the parties that are really interested in such certificates.
OK this solves issue 2.

bob

Of couse, this "advance OCSP stapling" doesn't help if the user connects to the system for the first time, or visits the system infrequently and therefore doesn't have a chance to learn about the rogue certificate early. That's where MECAI might be able to help.

Kai



-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to