Depends on what you mean by "matter".   I'd say it matters to a FireFox user
to know whether a site has the potential for a MITM attack even if the MITM
attack isn't currently underway. You said "No harm, no foul", but that
assumes no harm only encompasses immediate harm instead of both immediate
and potential harm.  There is harm by allowing a revoked certificate to
continue to be trusted even if that harm is not immediately recognized.

-----Original Message-----
From: dev-security-policy
[mailto:dev-security-policy-bounces+jeremy.rowley=digicert.com@lists.mozilla
.org] On Behalf Of Brian Smith
Sent: Monday, October 28, 2013 1:43 PM
To: Jeremy Rowley
Cc: [email protected]; Rick Andrews
Subject: Re: Netcraft blog, violations of CABF Baseline Requirements, any
consequences?

On Mon, Oct 28, 2013 at 12:28 PM, Jeremy Rowley <[email protected]>
wrote:
> There are lots of occasions:
> 1) Where a server with a private key is missing but there isn't yet an 
> active attack
> 2) Where the key was compromised
> 3) Where an error occurred and the certificate information identified 
> the wrong entity
> 4) Where the certificate was issued in accordance with the 
> then-applicable standards but standards have made the certificate 
> untrustworthy (internal names, 1024, SHA1)
> 5) Where the certificate profile is incorrect (lacks the appropriate 
> EKU or requested with incomplete information)
>
> All of these are security concerns that don't have an active attacker 
> and where even a soft-fail revocation effectively mitigates the risk.

Those all seem like valid reasons to revoke a certificate. But, those aren't
reasons for checking that a certificate has been revoked. In order for the
revocation to actually matter to a normal Firefox user, the user must find
himself in a scenerio like the one I previously described, right?

Cheers,
Brian

> -----Original Message-----
> From: dev-security-policy
> [mailto:[email protected]
> ozilla
> .org] On Behalf Of Brian Smith
> Sent: Monday, October 28, 2013 1:14 PM
> To: Rick Andrews
> Cc: [email protected]
> Subject: Re: Netcraft blog, violations of CABF Baseline Requirements, 
> any consequences?
>
> On Mon, Oct 28, 2013 at 11:31 AM, Rick Andrews 
> <[email protected]>
> wrote:
>> Brian, you seem to be saying that revocation checking adds value only 
>> when
> there's an attacker involved. If that's your point, I disagree. There 
> are cases in which a CA revokes a certificate because the site has 
> misrepresented itself, and revocation serves as a warning to the client.
>
> Thanks for the clarification. Could you give an example where such a 
> revocation would be useful to know about to a Firefox user to the 
> extent where the cost of doing the revocation checking is justified?
> So far, I'm of the opinion when there's no attacker, there's no 
> problem (no harm, no foul).
>
> Cheers,
> Brian
> --
> Mozilla Networking/Crypto/Security (Necko/NSS/PSM) 
> _______________________________________________
> dev-security-policy mailing list
> [email protected]
> https://lists.mozilla.org/listinfo/dev-security-policy
>



--
Mozilla Networking/Crypto/Security (Necko/NSS/PSM)
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to