On Sun, Nov 16, 2014 at 1:53 PM, Trevor Freeman
<trevor.freema...@icloud.com> wrote:
> Hi Max,
>
> I think we first need a consensus of the unmitigated threats this work would
> look to address. That would help assess the technical options. Top of my
> list of unmitigated threats would be compromised CA issuing  user
> certificates outside of the normal process e.g. attackers use some tool to
> sign the certificate direly using the CA key so no log exists of the
> issuance.

Seriously?

How often does this happen?

How often does an administrator sell a machine without zeroing the
hard drive where a live key is stored? How often does a corrupt admin
sell a private key? How often does a machine without a TPM with a cert
get rooted?


End entity breach is a daily occurrence.

> For example, if there is consensus on that as a threat to be addressed, OCSP
> does not help much in that you want a "known to be good" assertion, not a
> "know to be bad" assertion that revocation checking provides. Certificate
> reissuance has been long been cited as an alternative to revocation in that
> you get a restatement of the goodness which is what you need, but it does
> tax the CAs. If you are targeting server validation scenarios, then a Valid
> Certificate List which was similar to CRLs but a list of good certificates
> could scale much better as Phil points out. Given we know all too well what
> does not work well with CRLs, we should be able to avoid the mistakes i.e.
> use hashs to identify certificates not issue\serial number, mandate support
> for partitions etc., etc.

I much prefer using hash based mechanisms to issuer/serial. But in a
pinch, I will use hash of the issuer/serial :)

_______________________________________________
therightkey mailing list
therightkey@ietf.org
https://www.ietf.org/mailman/listinfo/therightkey

Reply via email to