> It's not so much about replacing keys which aren't strong enough (and
> actually you can just replace the old key+cert in that case), it's
> about dealing with compromised keys.
> 
> Certificate revocation is a disaster area. CRLs are often not checked
> at all (letsencrypt aren't even generating CRL entries for end-user
> certs - startssl will do but they charge for them, even for free
> certs). 

Ya I found out when I tried to upgrade to sha256 ;) and found I had to
wait for the current ones to expire.

> OCSP is probably checked more often in browsers than CRLs
> but fails open in some cases (and has terrible UI in others) and
> again isn't used universally - keeping certificate lifetimes short
> is a useful way to limit the damage that can be done by a compromised
> key. (and if letsencrypt *were* to start doing CRLs for revoked
> end-user certs, keeping lifetimes short would also limit the file
> size of the CRL).

Well atleast that's a more sensible reason. Not sure I like the idea of
a non priviledge seperated internet connecting script accessing the key
every few months (it is open source though), potentially nullifying
effort by some daemons/LibreSSL in that area. Despite joining the beta,
I haven't had time to look into the tools yet. I guess/hope it wouldn't
be hard to have a system user with key file access that provides a CSR
to another chrooted system user that downloads the new certificate. ftp
is pledged I believe in the next release which will add some belts and
braces I guess too.



-- 

KISSIS - Keep It Simple So It's Securable

Reply via email to