Re: powerline

2000-11-27 Thread Bill Stewart

At 02:16 AM 11/23/00 -, Ahmad Saufi wrote:
hi, can u inform me about accessing internet via power line technology,
if u have any news or info about it,please send/inform it to me.

Any Cypherpunks discussion on the topic would be in the archives,
at http://www.inet-one.com/ in Singapore.  You're probably better off
looking on a general-purpose web search engine,
or looking at specialized sites such as nwfusion.com or eetimes.com.
I think Nortel developed some of that technology,
but I don't know if they're the latest and hottest stuff.



Thanks! 
Bill
Bill Stewart, [EMAIL PROTECTED]
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




Re: Jim Bell arrested, documents online

2000-11-27 Thread Tom Vogt

Greg Newby wrote:
 
 Do people on this list really believe that the solution to
 problems is to kill people?
 
 Or are we just getting sarcastic and frustrated?

we've run this planet for a couple thousand years by way of killing
people. never touch a running system, you know?




RE: On 60 tonight

2000-11-27 Thread Trei, Peter

60" Sixty seconds? Is that a real quickie version of 60' (Sixty
minutes?

Notation counts (watch This Is Spinal Tap for another amusing
example of this type of goof-up).

Peter Trei


 --
 From: [EMAIL PROTECTED][SMTP:[EMAIL PROTECTED]]
 Reply To: [EMAIL PROTECTED]
 Sent: Sunday, November 26, 2000 6:32 PM
 To:   [EMAIL PROTECTED]
 Subject:  On 60" tonight
 
 My on-screen guide said "FISA", tvguide.com says,
 "Mike Wallace looks at one couple's claim that
 they were set up by the FBI and wrongly convicted of espionage."
 




Re: Jim Bell

2000-11-27 Thread A. Melon

Newby puzzles:

 Right, I agree.

But what I'd like to consider is a recipe for "plain ordinary"
folk to conspire anonymously to commit murder.

Not just any murder: murder for some of the people who (some
people on this list have said), are needing killin'.

If a bunch of crypto anarchists or whoever decide to knock off
Bill Gates or Al Gore (who really didn't invent the Internet
well enough...), you can bet someone will come looking pretty hard!

Again, I see this as a serious problem in applied cryptography.


Did you even bother to read AP? RTFM, dude!




Re: On 60 tonight

2000-11-27 Thread Declan McCullagh

Yep. Tim's post is closer to what a cypherpunk would do if elected. :)
I suspect that as soon as the election is over, probably in two weeks,
we'll hear plenty of calls for "healing" and enough GOP leaders will
go along with such a move.

-Declan

On Sun, Nov 26, 2000 at 07:59:59PM -0600, Mac Norton wrote:
 Use your head. One of the first things Bush does is pardon Bill
 Clinton.  After all, given who's in charge of the prosecution,
 if Gore gets elected Clinton gets prosecuted so the Repubs can keep
 that circus going; if Bush gets elected, it's not only no longer
 important, it looks vindictive, which is inconsistent with the 
 compassionate conservatism we've been hearing less and less about 
 lately and with "turning this country around", whatever that meant.
 
 So Bush pardons Clinton, which has the added plus of forcing Clinton
 to the choice of taking it or not.  That's *real* revenge.  Not that
 W. is that smart/mean, but his daddy is. 
 MacN
 
 
 On Sun, 26 Nov 2000, Tim May wrote:
 
  At 6:32 PM -0500 11/26/00, [EMAIL PROTECTED] wrote:
  My on-screen guide said "FISA", tvguide.com says,
  "Mike Wallace looks at one couple's claim that
  they were set up by the FBI and wrongly convicted of espionage."
  
  I notice you're babbling about what's on "60 Minutes" but not saying 
  a peep about the certification of the election in Bush's favor.
  
  Now that an incoming Republican Administration will be able to 
  prosecute Bill for his various crimes, Hillary for her tax evasion 
  and insider trading and Algore on treason charges, I can hear Air 
  Force One warming up its engines for its flight to Cuba.
  
  Fidel has offered asylum to Bill and Al,but not to Hillary. She's too 
  far left even for him.
  
  Hillary may have to take refuge with either the Palestinians, where 
  she can hug Yassir's wife all she wants, or ZOG. Maybe she can set up 
  a double-wide in "No Man's Land." A lesbian sistah like her would no 
  doubt like the sound of that.
  
  Regarding the Demonrats who tried to steal this election, I say it's 
  time to take out the trash.
  
  
  --Tim May
  -- 
  (This .sig file has not been significantly changed since 1992. As the
  election debacle unfolds, it is time to prepare a new one. Stay tuned.)
  
  
 




No Subject

2000-11-27 Thread zakyiria
I WANT TO KNOW ABOUT YOUR STUFFING LETTERS BUISNESS I CAN USE THE EXTRA MONEY.Do You Yahoo!?
Yahoo! Shopping - 
Thousands of Stores. Millions of Products.

Re: Public Key Infrastructure: An Artifact...

2000-11-27 Thread Lynn . Wheeler




problem is that consumer don't normally  know that they want to check on a
particular merchant's CRL entry until they realize that they want to go to that
merchant site. in general, the consumer's aren't going to want  keep a local
(usenet) database of all CRL entries (however they are distributed) ... so it is
more likely the ISP would have to keep all the entries ... pushed into a
database ... and let the consumer do an online database lookup of the CRL
entries (effectively the local ISP is keeping cached copy of all entries ... and
uses usenet as the distribution infrastructure).

sometimes, usenet can take several hrs to a day to propogate ... so the person
may still want to do an online transaction against the agency that issued a
certificate

In which case, the local ISP would be considered a "stand-in" ... maintaining a
negative file ... and returning positive answers if there isn't a match in the
negative file for the online transaction ... in which case the consumer may
still want to do another online transactions against the master file (located
somewhere in the internet).

Given that online transactions are being performed ... then it may even be more
straightforward to use domain name infrastructure to manage distribution and
management of cached entries. It has a somewhat better online transaction
semantics than usenet (already). However, since this is turning into  online
transaction infrastructure  ... it is then possible to eliminate both the
certificates and CRLs totally and just use the straight-foward domain name
infrastructure.

back again to certificates typically being superfulous and redundant in an
online infrastructure.






"Arnold G. Reinhold" [EMAIL PROTECTED] on 11/27/2000 07:53:35 AM

Please respond to "Arnold G. Reinhold" [EMAIL PROTECTED]

To:   Lynn Wheeler/CA/FDMS/FDC@FDC
cc:   [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED]
Subject:  Re: Public Key Infrastructure: An Artifact...



At 11:17 AM -0800 11/23/2000, [EMAIL PROTECTED] wrote:
Basically cetificates are an implementation of R/O partial replicated
distributed data that were intended to address availability of
information in a
predominately offline environment.

In the SSL server certificates, distribution of CRLs tend to create a problem
for consumers because they aren't likely to want to see
99.%
of the CRLs distributed and/or they aren't online at the time the CRLs are
distributed (and/or if done via email would create a horrible spam issue ...
every possible consumer in the world receiving email CRLs from every
possile SSL
server certificate issuing CA).

Sounds like a job for Usenet.

Arnold Reinhold

For help on using this list (especially unsubscribing), send a message to
"[EMAIL PROTECTED]" with one line of text: "help".










Re: Public Key Infrastructure: An Artifact...

2000-11-27 Thread Eric Murray

On Mon, Nov 27, 2000 at 10:58:23AM -0800, [EMAIL PROTECTED] wrote:


Hi Lynn!
 
 problem is that consumer don't normally  know that they want to check on a
 particular merchant's CRL entry until they realize that they want to go to that
 merchant site. in general, the consumer's aren't going to want  keep a local
 (usenet) database of all CRL entries (however they are distributed) ... so it is
 more likely the ISP would have to keep all the entries ... pushed into a
 database ... and let the consumer do an online database lookup of the CRL
 entries (effectively the local ISP is keeping cached copy of all entries ... and
 uses usenet as the distribution infrastructure).
 
 sometimes, usenet can take several hrs to a day to propogate ... so the person
 may still want to do an online transaction against the agency that issued a
 certificate
 
 In which case, the local ISP would be considered a "stand-in" ... maintaining a
 negative file ... and returning positive answers if there isn't a match in the
 negative file for the online transaction ... in which case the consumer may
 still want to do another online transactions against the master file (located
 somewhere in the internet).
 
 Given that online transactions are being performed ... then it may even be more
 straightforward to use domain name infrastructure to manage distribution and
 management of cached entries. It has a somewhat better online transaction
 semantics than usenet (already). However, since this is turning into  online
 transaction infrastructure  ... it is then possible to eliminate both the
 certificates and CRLs totally and just use the straight-foward domain name
 infrastructure.


However, caching the revocation data (which DNS would do nicely) means
that there needs to be some way for the relying parties to authenticate
the cached revocation data.  They could authenticate the DNS cache, but
that means trusting all those DNS servers.  More practically
the DNS cache servers could authenticate the data as coming from a trusted
DNS server (which is how DNSSEC works now I beleive).  But that forces
the relying parties to trust that the DNS server that they're getting
the revocation data from has done the authentication.  And it
still doesn't address the issue of Mallet operating an evil DNS-CRL
cache which sends out bogus revocation data.  It also requires
the DNS caches to do the public-key crypto.

But, there's a solution- if the DNS servers and caches are sending out
revocation data which is signed by the real authority for revocation data
(whoever that may be for the application), and the relying parties
do the verification, then there's no security problem with the intermediate
DNS servers/caches.

So, IMHO, signed CRLs serve a purpose.

I agree that a cache system like DNS would be nice for CRL distribution
but I think that a usenet-type system would be good enough in practice.

I don't think that propagation delays are that big a problem in practical
use for TLS sites.  A CRL would only be issued if a merchant has shown
some amount of bad behaviour, or if there's been a key compromise.
For bad behaviour, there would likely be some sort of process
involved in issuing the CRL- one single report of merchant fraud would
not cause an issuer to revoke a cert instantly.  So if a merchant
goes "bad", there's likely to be quite a delay before they're revoked-
notices, appeals, etc.  A few hours taken in the distribution of the CRL
once the issuer's completed the process isn't going to make the problem
noticeably worse.

It'd be nice to have instant CRL distribution for key compromise, but
most sites will have been running with the compromised key for some time
before it's detected.  If a site really cares about security after
a key compromise, it could just go get a new cert and use that (after
fixing the problem that caused the compromise of course).





-- 
  Eric Murray   Consulting Security Architect SecureDesign LLC
  http://www.securedesignllc.comPGP keyid:E03F65E5




ip: TechNews: NSA Builds Security Access Into Windows

2000-11-27 Thread R. A. Hettinga


--- begin forwarded text


Date: Mon, 27 Nov 2000 19:29:40 -0600
To: [EMAIL PROTECTED]
From: Robert Huddleston [EMAIL PROTECTED] (by way of
[EMAIL PROTECTED])
Subject: ip: TechNews: NSA Builds Security Access Into Windows
Cc: [EMAIL PROTECTED]

http://www.guncontrolvictories.com/enemies_ms.html

Gun Control Victories

ECHELON (NSA) in Windows

Technology News NSA Builds Security Access Into Windows

A careless mistake (what a crock my comment) by Microsoft programmers has
shown that special access codes for use by the U.S. National Security
Agency (NSA) have been secretly built into all versions of the Windows
operating system. Computer-security specialists have been aware for two
years that unusual features are contained inside a standard Windows driver
used for security and encryption functions. The driver, called ADVAPI.DLL,
enables and controls a range of security functions including the Microsoft
Cryptographic API (MS-CAPI). In particular, it authenticates modules signed
by Microsoft, letting them run without user intervention.


At last year's Crypto 98 conference, British cryptography specialist Nicko
van Someren said he had disassembled the driver and found it contained two
different keys. One was used by Microsoft to control the cryptographic
functions enabled in Windows, in compliance with U.S. export regulations.
But the reason for building in a second key, or who owned it, remained a
mystery. Now, a North Carolina security company has come up with conclusive
evidence the second key belongs to the NSA. Like van Someren, Andrew
Fernandes, chief scientist with Cryptonym of Morrisville, North Carolina,
had been probing the presence and significance of the two keys. Then he
checked the latest Service Pack release for Windows NT4, Service Pack 5. He
found Microsoft's developers had failed to remove or "strip" the debugging
symbols used to test this software before they released it. Inside the code
were the labels for the two keys. One was called "KEY." The other was
called "NSAKEY."

Fernandes reported his re-discovery of the two CAPI keys, and their secret
meaning, to the "Advances in Cryptology, Crypto'99" conference held in
Santa Barbara. According to those present at the conference, Windows
developers attending the conference did not deny the "NSA" key was built
into their software. But they refused to talk about what the key did, or
why it had been put there without users' knowledge. But according to two
witnesses attending the conference, even Microsoft's top crypto programmers
were stunned to learn that the version of ADVAPI.DLL shipping with Windows
2000 contains not two, but three keys. Brian LaMachia, head of CAPI
development at Microsoft was "stunned" to learn of these discoveries, by
outsiders.

This discovery, by van Someren, was based on advance search methods which
test and report on the "entropy" of programming code. Within Microsoft,
access to Windows source code is said to be highly compartmentalized,
making it easy for modifications to be inserted without the knowledge of
even the respective product managers. No researchers have yet discovered a
programming module which signs itself with the NSA key. Researchers are
divided about whether it might be intended to let U.S. government users of
Windows run classified cryptosystems on their machines or whether it is
intended to open up anyone's and everyone's Windows computer to
intelligence gathering techniques deployed by the NSA's burgeoning corps of
"information warriors."


According to Fernandes of Cryptonym, the result of having the secret key
inside your Windows operating system "is that it is tremendously easier for
the NSA to load unauthorized security services on all copies of Microsoft
Windows, and once these security services are loaded, they can effectively
compromise your entire operating system". The NSA key is contained inside
all versions of Windows from Windows 95 OSR2 onward. "For non-American IT
managers relying on WinNT to operate highly secure data centers, this find
is worrying," he added. "The U.S government is currently making it as
difficult as possible for 'strong' crypto to be used outside of the U.S.
That they have also installed a cryptographic back-door in the world's most
abundant operating system should send a strong message to foreign IT
managers. "How is an IT manager to feel when they learn that in every copy
of Windows sold, Microsoft has installed a 'back door' for the NSA --
making it orders of magnitude easier for the U.S. government to access your
computer?" he said. Van Someren said he felt the primary purpose of the NSA
key might be for legitimate U.S. government use. But he said there cannot
be a legitimate explanation for the third key in Windows 2000 CAPI. "It
looks more fishy," he said on Friday. Fernandes said he believed the NSA's
built-in loophole could be turned round against the snoopers.

The NSA key inside CAPI could be replaced by your own key, and used to sign
cryptographic 

Imagine

2000-11-27 Thread No User



A history professor from Uppsala Universitet in Sweden, called to tell me about
this article she had read in which a
Zimbabwe politician was quoted as saying that children should study this event
closely for it shows that election
fraud is not only a Third World phenomena. 

1. Imagine that we read of an election occurring anywhere in the third world in
which the self declared winner was
the son of the former prime minister and that former prime minister was himself
the former head of that nation's
secret police (CIA). 

2. Imagine that the self declared winner lost the popular vote but won based on
some old colonial holdover (electoral
college) from the nation's pre-democracy past. 

3. Imagine that the self-declared winner's 'victory' turned on disputed votes
cast in a province governed by his
brother! 

4. Imagine that the poorly drafted ballots of one district, a district heavily
favoring the self-declared winner's
opponent, led thousands of voters to vote for the wrong candidate. 

5. Imagine that that members of that nation's most despised caste, fearing for
their lives/livelihoods, turned out in
record numbers to vote in near-universal opposition to the self-declared
winner's candidacy. 

6. Imagine that hundreds of members of that most-despised caste were
intercepted on their way to the polls by state
police operating under the authority of the self-declared winner's brother. 

7. Imagine that six million people voted in the disputed province and that the
self-declared winner's 'lead' was only
327 votes. Fewer, certainly, than the vote counting machines' margin of error. 

8. Imagine that the self-declared winner and his political party opposed a more
careful by-hand inspection and
re-counting of the ballots in the disputed province or in its most hotly
disputed district. 

9. Imagine that the self-declared winner, himself a governor of a major
province, had the worst human rights record
of any province in his nation and actually led the nation in executions. 

10. Imagine that a major campaign promise of the self-declared winner was to
appoint like-minded human rights
violators to lifetime positions on the high court of that nation. 

None of us would deem such an election to be representative of anything other
than the self-declared winner's
will-to-power. All of us, I imagine, would wearily turn the page thinking that
it was another sad tale of pitiful pre- or
anti-democracy peoples in some strange elsewhere." 




Re: ZKS -- the path to world domination

2000-11-27 Thread Adam Back


Greg wrote earlier about ZKS' Managed Privacy services:

 what I wonder about with this is where ZKS' loyalties will appear to
 be. Consumers probably want to see their privacy software vendor as
 "on their side"; but commercial interests working on data collection
 are probably going to want to work with people who will help them
 advance their own goals, sometimes at the price of others'
 privacy. 

Well ZKS should have an interest maintaining a good reputation for
acting in the interests of users privacy.  Companies who use such
services should also have an interest in using services of companies
with good privacy reputations -- as this would tend to give better
consumer confidence in the resulting systems.

 The closest parallel I can see is to environmental groups, who have
 in some cases endorsed certain corporations or certain practices as
 "green" or "environmentally friendly", and who have subsequently
 lost stature among some of their members and peers as having "sold
 out". I don't know if it will work well to be perceived as serving
 two masters - even if the corporate interests pay lip service to
 "protecting our customers' privacy".

I guess the only answers are maintaining professionalism, and
integrity and to maintain a strong stance on users privacy, with clear
long term objectives (avoiding short-sighted small incremental
improvements which may stay for a long time just because of the fact
that built working systems don't get replaced as long as they continue
to function).  Openness would be a guiding principle too I would think
-- so that users and technology critics can analyse and criticize the
systems.  Transparent functioning is a huge win for privacy.

Adam




Re: Jim Bell

2000-11-27 Thread R. A. Hettinga

At 7:45 PM -0800 on 11/27/00, Tim May wrote:


 (I think any of
 us could be called as witnesses to refute a state claim that he was
 deploying a real system!)

Which, unfortunately, and IIRC, he actually *pled* to, nonetheless.

Sheesh.

Cheers,
RAH
-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




Re: Jim Bell

2000-11-27 Thread Declan McCullagh

The affidavit/complaint we link to at cluebot.com contains an
allegation from the Feds that Bell only 'fessed up to (in previous
interviews with l.e.)  authoring the AP essays.

I do not recall reading about, or writing about, Bell being charged
with deploying a working AP system. No, they've been prosecuting him
using far more mundane allegations of SSN misuse, stinkbombs, and
stalking. AP just gives it all spice, I suppose.

-Declan


On Mon, Nov 27, 2000 at 11:46:14PM -0500, R. A. Hettinga wrote:
 At 7:45 PM -0800 on 11/27/00, Tim May wrote:
 
 
  (I think any of
  us could be called as witnesses to refute a state claim that he was
  deploying a real system!)
 
 Which, unfortunately, and IIRC, he actually *pled* to, nonetheless.
 
 Sheesh.
 
 Cheers,
 RAH
 -- 
 -
 R. A. Hettinga mailto: [EMAIL PROTECTED]
 The Internet Bearer Underwriting Corporation http://www.ibuc.com/
 44 Farquhar Street, Boston, MA 02131 USA
 "... however it may deserve respect for its usefulness and antiquity,
 [predicting the end of the world] has not been found agreeable to
 experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
 




Re: Imagine

2000-11-27 Thread Anonymous

No User [EMAIL PROTECTED] wrote:

 A history professor from Uppsala Universitet in Sweden, called to
 tell me about this article she had read

Uppsala Universitet has no female history professors. Sorry.




Re: Jim Bell

2000-11-27 Thread R. A. Hettinga

At 1:19 AM -0500 on 11/28/00, Declan McCullagh wrote:


 I do not recall reading about, or writing about, Bell being charged
 with deploying a working AP system.

Hmmm...

Maybe it was Toto's ersatz-AP web page I was remembering, now that I think
about it, which, of course, Toto *didn't* plead to...

Cheers,
RAH
-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




Excerpts from The Design and Verification of a Cryptographic Security Architecture available

2000-11-27 Thread Peter Gutmann

In August I finally submitted my PhD thesis, coming close to wrapping up my
long career as a tenured graduate student.  Although the work hasn't been
accepted yet, there has been some interest expressed in portions of it so I've
put a few chapters online.  Note that these chapters represent a draft only and
are not the completed work.

The main part of the thesis, Chapters 1-5, is available from
http://www.cs.auckland.ac.nz/~pgut001/pubs/thesis.html.  These chapters look at
an alternative way of building what people have been trying to do with Orange
Book B3/A1-type systems, but in a way which is feasible and practical for an
open source system where you don't have tens of millions of dollars and 5-10
years available to produce a product.

The chapters are (from the web page, where they're links to the docs):

  The software architecture, wherein the cryptlib software architecture is
  presented

  The security architecture, wherein the cryptlib security architecture is
  presented

  The kernel implementation, wherein the implementation details of the cryptlib
  security kernel are examined

  Verification techniques, wherein existing methods for building secure systems
  are examined and found wanting

  Verification of the cryptlib kernel, wherein a new method for building a
  secure system is presented.

Peter.





Re: Jim Bell

2000-11-27 Thread Tim May

At 1:19 AM -0500 11/28/00, Declan McCullagh wrote:
The affidavit/complaint we link to at cluebot.com contains an
allegation from the Feds that Bell only 'fessed up to (in previous
interviews with l.e.)  authoring the AP essays.

I do not recall reading about, or writing about, Bell being charged
with deploying a working AP system. No, they've been prosecuting him
using far more mundane allegations of SSN misuse, stinkbombs, and
stalking. AP just gives it all spice, I suppose.

More than spice, I think. I think _this_ time they plan to make AP 
part of their case.

As your own article said,

"When the feds searched Bell's home earlier this month, according to 
a one-page attachment to the search warrant, agents were looking for 
"items which refer to Assassination Politics.""

I won't engage in the kind of speculation about how they might build 
their case, but I think this is where they are going.

Granted, they will not try to claim that Bell was running a real AP 
lottery. But they may make claims that he was planning an 
assassination. Some jurors might be swayed by the language in AP and 
by the (alleged) utterance:

"Say goodnight, Joshua."

(Wasn't Joshua the computer in "War Games"?)


On Mon, Nov 27, 2000 at 11:46:14PM -0500, R. A. Hettinga wrote:
  At 7:45 PM -0800 on 11/27/00, Tim May wrote:


   (I think any of
   us could be called as witnesses to refute a state claim that he was
   deploying a real system!)

  Which, unfortunately, and IIRC, he actually *pled* to, nonetheless.

   Sheesh.


No, I don't recall any such plea. Inasmuch as AP is some years off 
into the future, as even Bell would probably acknowledge (and may 
have acknowledged, if one dredges up all of his posts and looks at 
them carefully), I doubt he'd make a plea agreement that he had 
deployed a working AP system.

I think AP was just hovering on the periphery in the first two rounds.

This time they may try to make it a more central part of some case. 
Hence my comment that some of us may be called by the defense to 
explain why AP could not possibly be an operational system at this 
time.


--Tim May

-- 
(This .sig file has not been significantly changed since 1992. As the
election debacle unfolds, it is time to prepare a new one. Stay tuned.)




Re: Public Key Infrastructure: An Artifact...

2000-11-27 Thread Arnold G. Reinhold

At 11:17 AM -0800 11/23/2000, [EMAIL PROTECTED] wrote:
Basically cetificates are an implementation of R/O partial replicated
distributed data that were intended to address availability of 
information in a
predominately offline environment.

In the SSL server certificates, distribution of CRLs tend to create a problem
for consumers because they aren't likely to want to see 
99.%
of the CRLs distributed and/or they aren't online at the time the CRLs are
distributed (and/or if done via email would create a horrible spam issue ...
every possible consumer in the world receiving email CRLs from every 
possile SSL
server certificate issuing CA).

Sounds like a job for Usenet.

Arnold Reinhold