Re: Online Certificate Revocation Protocol

Lynn.Wheeler@firstdata.com Wed, 13 June 2001 15:31 UTC

Received: from above.proper.com (above.proper.com [208.184.76.39]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA25213 for <pkix-archive@odin.ietf.org>; Wed, 13 Jun 2001 11:31:43 -0400 (EDT)
Received: from localhost (localhost [[UNIX: localhost]]) by above.proper.com (8.11.3/8.11.3) id f5DEmuD21212 for ietf-pkix-bks; Wed, 13 Jun 2001 07:48:56 -0700 (PDT)
Received: from mail.Firstdatacorp.COM (mail.firstdatacorp.com [204.124.84.42]) by above.proper.com (8.11.3/8.11.3) with ESMTP id f5DEmtJ21208 for <ietf-pkix@imc.org>; Wed, 13 Jun 2001 07:48:55 -0700 (PDT)
Received: (from smtp@localhost) by mail.Firstdatacorp.COM (8.9.3/8.9.3) id JAA19914; Wed, 13 Jun 2001 09:34:51 -0500 (CDT)
X-Authentication-Warning: mail.firstdatacorp.com: smtp set sender to <Lynn.Wheeler@firstdata.com> using -f
Received: from () by mail via smap (V2.1) id xmab12657; Wed, 13 Jun 01 14:15:59 GMT
Subject: Re: Online Certificate Revocation Protocol
To: jim <jimhei@cablespeed.com>
Cc: Carlin Covey <ccovey@cylink.com>, ietf-pkix@imc.org
From: Lynn.Wheeler@firstdata.com
Date: Wed, 13 Jun 2001 08:26:58 -0700
Message-ID: <OFC83BBA31.DBA03394-ON88256A6A.00545E94@fdcsg.1dc.com>
X-MIMETrack: Serialize by Router on SRVMTA1/FDR/FDC(Release 5.0.7 |March 21, 2001) at 06/13/2001 09:29:57 AM
MIME-Version: 1.0
Content-type: text/plain; charset="us-ascii"
Sender: owner-ietf-pkix@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-pkix/mail-archive/>
List-ID: <ietf-pkix.imc.org>
List-Unsubscribe: <mailto:ietf-pkix-request@imc.org?body=unsubscribe>
List-ID: <ietf-pkix.imc.org>


a certificate doesn't represent anything particularly magic ... pretty much
a credential target at being used in offline environments (when there
access to an online authority) ... and the thing the credential represents
is pretty much ... stuff that notaries do on a routine basis .... check
some sort of reference to authenticate some information. In fact, a big
part of the reason that a certificate has a validity period at all ... is
to limited the exposure of a certifying authority in an offline paradigm
environment where the certificate could be used in an unknown number of
unknown transactions. A notary doing the certification in real time and
online doesn't have that exposure because they typically know the number
and kinds of transactions they are certifying.




jim <jimhei@cablespeed.com> on 06/13/2001 06:24:03 AM

To:   Lynn Wheeler/CA/FDMS/FDC@FDC
cc:   Carlin Covey <ccovey@cylink.com>, ietf-pkix@imc.org
Subject:  Re: Online Certificate Revocation Protocol


This is especially true if the secure audit trail contains the information
that
the user was authenticated at the beginning of the session and that the
authentication was successful, the certificate was within its validity
period
and that it was not revoked.
Jim