Santosh Chokhani wrote:
>
> Ben Laurie wrote:
>>
>> Martin Rex wrote:
>>>
>>> Locating the OCSP server through AIA in the EE cert might be the 
>>> problem here.  Maybe the OCSP responder ought to be located through an 
>>> extension in the CA cert itself instead?
>> 
>> That would make CT substantially harder, because then we'd have to deal
>> with authenticating chains instead of just EE certs - and EE certs tend
>> to have multiple authentication chains...
>
> Agree and also in that case the solution is not robust enough from
> security standpoint.  The adversary needs to do DNS poisoning and
> then is in business.

My comment was not directed at CT itself, but rather at the problem
of locating the OCSP server (plus determining authorized OCSP signers),
because it is entirely ignorant of mis-issued certificates.

The key that signed an EE cert is static and hardwired into the
CA certificate, so I see exactly zero problems with hardwiring an
(a) OCSP distribution point into the same CA cert and (b) identifying
a different CA key within that CA cert extension that is authorized
to issue shortlive OCSP signer certs, so that the CA key that issues
EE certs is no longer an unavoidable single point of failure.


-Martin
_______________________________________________
therightkey mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/therightkey

Reply via email to