Rob,

On 16/03/16 17:45, Stephen Kent wrote:
Rob,
<snip>
So we (where "we" may or may not be TRANS) need to fix revocation!
Revoking an intermediate _certificate_ just isn't sufficient.
To be effective, the intermediate _public key_ needs to be revoked
somehow.

One does not revoke keys in a PKI. One revokes certs.

Steve, I know very well how the existing IETF mechanisms for revocation (i.e. CRL and OCSP) work. But I don't see why that should mean that new revocation mechanisms can't be invented, especially if those new mechanisms can thwart attacks that CRL and OCSP can't.
I don't dispute the potential for developing new revocation mechanisms. But, in writing the threat analysis I am dealing with what is specified in current IETF standards. If your comment was meant to suggest a mechanism for use in browsers, not PKIs in general, then I apologize. Also, it would be good if there were an RFC defining browser cert blacklisting mechanisms, so that we might know
what capabilities we can rely on, in general.

Note that, in PKI in general, revoking a key, vs. a cert, may be inappropriate. For example, in the RPKI context we focus on address and ASN extensions as capabilities, for authorization. We might want to revoke a cert, but not the key in the cert, because a new cert will be issued with different extensions. We may not want to create operational problems by requiring the new cert to have a new key.


Steve

_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans

Reply via email to