RE: Online Certificate Revocation Protocol

Tony Bartoletti <azb@llnl.gov> Mon, 11 June 2001 18:54 UTC

Received: from above.proper.com (above.proper.com [208.184.76.39]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA16820 for <pkix-archive@odin.ietf.org>; Mon, 11 Jun 2001 14:54:17 -0400 (EDT)
Received: from localhost (localhost [[UNIX: localhost]]) by above.proper.com (8.11.3/8.11.3) id f5BI3BC12656 for ietf-pkix-bks; Mon, 11 Jun 2001 11:03:11 -0700 (PDT)
Received: from smtp-1.llnl.gov (smtp-1.llnl.gov [128.115.250.81]) by above.proper.com (8.11.3/8.11.3) with ESMTP id f5BI36J12648 for <ietf-pkix@imc.org>; Mon, 11 Jun 2001 11:03:06 -0700 (PDT)
Received: from poptop.llnl.gov (localhost [127.0.0.1]) by smtp-1.llnl.gov (8.9.3/8.9.3/LLNL-gateway-1.0) with ESMTP id LAA13610; Mon, 11 Jun 2001 11:02:58 -0700 (PDT)
Received: from catalyst.llnl.gov (catalyst.llnl.gov [128.115.222.68]) by poptop.llnl.gov (8.8.8/LLNL-3.0.2/pop.llnl.gov-5.1) with ESMTP id LAA13045; Mon, 11 Jun 2001 11:02:57 -0700 (PDT)
Message-Id: <4.3.2.7.2.20010611110541.00b15a00@poptop.llnl.gov>
X-Sender: e048786@poptop.llnl.gov
X-Mailer: QUALCOMM Windows Eudora Version 4.3.2
Date: Mon, 11 Jun 2001 11:10:31 -0700
To: Santosh Chokhani <chokhani@cygnacom.com>, "Scherling, Mark" <mscherling@rsasecurity.com>, 'jim' <jimhei@cablespeed.com>, Santosh Chokhani <chokhani@cygnacom.com>
From: Tony Bartoletti <azb@llnl.gov>
Subject: RE: Online Certificate Revocation Protocol
Cc: "Housley, Russ" <rhousley@rsasecurity.com>, pgut001@cs.auckland.ac.nz, ietf-pkix@imc.org
In-Reply-To: <8D7EC1912E25D411A32100D0B76953978DF4C9@scygmxs01.cygnacom. com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format="flowed"
Sender: owner-ietf-pkix@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-pkix/mail-archive/>
List-ID: <ietf-pkix.imc.org>
List-Unsubscribe: <mailto:ietf-pkix-request@imc.org?body=unsubscribe>
List-ID: <ietf-pkix.imc.org>

At 12:01 PM 6/11/01 -0400, Santosh Chokhani wrote:
>Revocation of a public key certificate whose companion key has been 
>destroyed is a BAD idea.
>
>For example, if the subject of the key is a CA, revocation of that public 
>key certificate could cause denial of service for all the certificates 
>issued by that CA.  There is nothing wrong with the certificates.

I admit I'm on the fence here, but one should be able to "revoke the 
certificate" only in terms that mean "any signatures created after that 
point are invalid", without interfering with the ability to use the public 
key to continue verifying previously signed objects.

This suggests that CAs (or someone) should provide an historical "was valid 
between" service.  This would mitigate the DoS issue.

___tony___


Tony Bartoletti 925-422-3881 <azb@llnl.gov>
Information Operations, Warfare and Assurance Center
Lawrence Livermore National Laboratory
Livermore, CA 94551-9900