On Thu, Sep 8, 2011 at 9:33 AM, nlsp <niels.po...@gmail.com> wrote:

> This boils down to whether it is okay to prioritize availability over
> security.

Availability is a security guarantee just like confidentiality or integrity.

> Still, the actual question remains: does the android browser
> support CRL or OCSP in any form?

Even desktop Firefox has security.OCSP.require set to false. Read the
Imperial Violet post again carefully.

> And since CRLs can be cached, it would be perfectly sane to have a
> cached CRL on device for an intermediate that has been compromised,

They get kind of big.

> such as currently Diginotar “Staat der Nederlanden *” intermediates.
> And note that removing the Diginotar root from cacerts.bks does not
> help since the intermediates are chained up to a “Staat der
> Nederlanden” root which is not compromised and should remain trusted.

Actually, no, Staat der Nederlanden is also dead:

https://blog.mozilla.com/security/2011/09/02/diginotar-removal-follow-up/

-- 
You received this message because you are subscribed to the Google Groups 
"Android Security Discussions" group.
To post to this group, send email to android-security-discuss@googlegroups.com.
To unsubscribe from this group, send email to 
android-security-discuss+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/android-security-discuss?hl=en.

Reply via email to