This an interesting issue Kaspar and I appreciate you raising it. I also personally appreciate you framing it in terms of trust because that's really what is at issue here.
The whole idea of revocation is a gaping hole in the PKI landscape. The ability to say "don't trust me" is so poorly implemented throughout PKI as to be effectively non-existent. If for some reason you need to revoke a cert, you should do so because it's the right thing to do, but the best you can hope for is that some anti-security person doesn't figure out a way to use it anyway. This means that theft and other compromises of private keys remain viable attack vectors for those who wish to do so (government sponsored organizations and otherwise). Private keys and the certs that go with them could be usable well after when people think they become invalid. This also means that we should not be surprised to see an underground market appear that seeks to sell "revoked" certs. Given that "high value" internet destinations might have been impacted by the Heartbleed vulnerability this could definitely become a concern. Should such a place appear I would think StartCom - issued certs would easily be included for sale. This also means that all "pay to revoke" policies should be viewed as anti-security and we need to "strongly encourage" they be discontinued in short order. If a CA wishes to continue such policies I would question their trustworthiness. Further I think we are reaching the point where browsers have to refuse SSL connections when OCSP validation fails. I think it's getting harder to argue otherwise, but I'll let the Mozilla folks speak to that. ----- Original Message ----- From: Kaspar Janßen Sent: Thursday, April 10, 2014 4:12 AM On 10/04/14 10:08, Peter Eckersley wrote: > Kaspar, suppose that Mozilla followed your suggestion and removed > StartCom's root certificates from its trust store (or revoked them!). What > would the consequences of that decision be, for the large number of domains > that rely on StartCom certs? I hope that an appropriate policy will force authorities to reconsider their revocation principle. I don't want to harm someone nor I want to work off in any way. The key is that anybody should be able to shout out "don't trust me anymore!" without a fee. Isn't that part of the trustchain idea? I read a few times that Chrome doesn't even check if a certificate is revoked or not (at least not the default settings). That leads me to the question: Is it mandatory for a CA in mozilla's truststore to have to ability to revoke a certificate or is is only an optional feature provided by some CAs? _______________________________________________ dev-security-policy mailing list [email protected] https://lists.mozilla.org/listinfo/dev-security-policy

