Paul,

Paul Hoffman wrote:
I disagree with Julien on two items in this thread.

At 5:31 PM -0700 10/20/08, Julien R Pierre - Sun Microsystems wrote:
If the root could "revoke itself", in the case of root cert key compromise, ie. 
the root cert's private key becoming public, anybody could then sign revocation 
information for that root CA - whether to mark it revoked or unrevoked. The revocation 
therefore always has to come from a higher level than the root cert iteslf.

This is not true at all. Only someone who knows the private key can sign the 
suicide note. Obviously, it is not in an attacker's best interest to sign it.

If the root CA private key has been compromised, potentially anybody could sign "suicide notes", provided an actual format existed for them.

That's the definition of a private key compromise - the private key fell into the wrong hands. For example, the private key might have been extracted, or cracked and posted on a public website, in an extreme case.

If you use a format such as a CRL for the "suicide note", then you have to potentially deal with other problems such as "resurrection notes".

This is a fairly theoritical discussion anyway since suicide notes don't exist in PKIX.

You should take that up with the IETF if you want the CRL and OCSP protocols 
changed to allow root revocation.

Good lord, no. If you follow the IETF's PKIX WG, you will see that they take 
forever to finish something and it often comes out much worse than when it went 
in. Well, that was true in the past; now, most people are just burnt out and 
not saying anything.

Myself included, I haven't been on the IETF list for a while. However, this is really the process that we are stuck with. There is little point in trying to come up with some generic root revocation scheme if you are going to be the only one using it in the end. I don't really see how that's better than a proprietary mechanism like the mozilla update process.

If you want to to be able to "revoke" roots, please consider instead getting 
active in the current work on TAMP (trust anchor management protocol) being discussed in 
the PKIX WG. It's a large protocol, but that's because the initial work was done before 
coming to the IETF. The authors are genuinely interested in getting feedback on the 
proposal, and they are getting too little in the WG.

Thanks for the pointer. I will take a look.
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to