Rollin Yu <rollin...@trustasia.com> writes:

>Among them, certificates revoked due to CRLReason #1 (key compromise):
>254,690

How reliable are those figures though?  Unless an attacker thoughtfully
notifies you that they've stolen your key, how would anyone know it's been
compromised?  What if it's just the default setting in software for
revocations, since keyCompromise is the very first CRL reason entry?  What if
it's deliberately selected because keyCompromise gets given a higher priority
(urgent) than any other reason (oh, just FYI...).

What are the figures for other crlReasons?  If superseded (due to forced cert
turnover) has a much lower count than keyCompromise then we can be pretty sure
the keyCompromise figures aren't realistic.

Peter.

-- 
You received this message because you are subscribed to the Google Groups 
"dev-security-policy@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to dev-security-policy+unsubscr...@mozilla.org.
To view this discussion visit 
https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/ME0P300MB0713ECDBD50465977986D726EED42%40ME0P300MB0713.AUSP300.PROD.OUTLOOK.COM.

Reply via email to