On 11/13/14, 7:59 PM, Dr. Massimiliano Pala wrote:
Hi all,
If it is not too late... regarding Session 7.5 - first bullet point: the
text seems a bit too restrictive. Probably in the context of current Web
Browser CRLs are not used today, but other environments still make a
wide use of CRLs. I also would like to add a privacy consideration about
the use of CRLs vs. other mechanisms.
For this I would the text from:
Certificate Revocation Lists (CRLs) are not scalable and therefore
rarely used.
to something like the following:
Certificate Revocation Lists (CRLs) provide the most supported
revocationinformation distribution mechanism. Although updates to
the CRLformat (e.g., partitioned CRLs, delta CRLs) have been defined
toaddress scalability issues, they are rarely used in favor of more
compact formats. However, it is important to notice that the use of
CRLs might provide better privacy-preserving properties than other
protocols (e.g., OCSP), especially when considering the validation of
client-side certificate.
The last consideration stems from the fact that by using CRLs, a service
does not need to communicate to the certificate issuing authority (e.g.,
the CA or the entity running an OCSP server) and disclose the
certificate for which the revocation status is requested.
How about this?
o Although Certificate Revocation Lists (CRLs) are the most widely
supported mechanism for distributing revocation information, they
have known scaling challenges that limit their usefulness.
However, CRLs might provide better privacy-preserving properties
than other techniques (e.g., OCSP), since there is no need to
communicate with a third party regarding the certificate that a
client is checking.
Peter
--
Peter Saint-Andre
https://andyet.com/
_______________________________________________
Uta mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/uta