Re: Online Certificate Revocation Protocol

Massimiliano Pala <madwolf@openca.org> Mon, 11 June 2001 23:42 UTC

Received: from above.proper.com (above.proper.com [208.184.76.39]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA20740 for <pkix-archive@odin.ietf.org>; Mon, 11 Jun 2001 19:42:12 -0400 (EDT)
Received: by above.proper.com (8.11.3/8.11.3) id f5BMeBZ19418 for ietf-pkix-bks; Mon, 11 Jun 2001 15:40:11 -0700 (PDT)
Received: from mail.hackmasters.net (IDENT:postfix@[217.133.253.32]) by above.proper.com (8.11.3/8.11.3) with ESMTP id f5BMe9J19412 for <ietf-pkix@imc.org>; Mon, 11 Jun 2001 15:40:09 -0700 (PDT)
Received: from openca.org (galadriel.mpcnet.org [10.5.122.180]) by mail.hackmasters.net (Postfix) with ESMTP id 5ECB73CEE for <ietf-pkix@imc.org>; Tue, 12 Jun 2001 01:45:05 +0200 (CEST)
Message-ID: <3B2549C1.2A6E30E4@openca.org>
Date: Tue, 12 Jun 2001 00:44:17 +0200
From: Massimiliano Pala <madwolf@openca.org>
Organization: OpenCA
X-Mailer: Mozilla 4.77 [en] (X11; U; Linux 2.2.18 i686)
X-Accept-Language: en
MIME-Version: 1.0
To: ietf-pkix@imc.org
Subject: Re: Online Certificate Revocation Protocol
References: <4.3.2.7.2.20010611110541.00b15a00@poptop.llnl.gov>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: owner-ietf-pkix@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-pkix/mail-archive/>
List-ID: <ietf-pkix.imc.org>
List-Unsubscribe: <mailto:ietf-pkix-request@imc.org?body=unsubscribe>
List-ID: <ietf-pkix.imc.org>
Content-Transfer-Encoding: 7bit

Tony Bartoletti wrote:
> 
> At 12:01 PM 6/11/01 -0400, Santosh Chokhani wrote:
> >Revocation of a public key certificate whose companion key has been
> >destroyed is a BAD idea.

I think that destroying deliberately its own key and incidentally are
different cases. I think the second is to be considered a "loose of
control" of the key -- to me SHOULD be revoked. Could we think adding
a CRL extension for this scenario (keyDestroyed) ???

> I admit I'm on the fence here, but one should be able to "revoke the
> certificate" only in terms that mean "any signatures created after that
> point are invalid", without interfering with the ability to use the public
> key to continue verifying previously signed objects.

I agree with you -- and actually I think many laws on digital signature
means that when talking about certificate revocation.
 
> This suggests that CAs (or someone) should provide an historical "was valid
> between" service.  This would mitigate the DoS issue.

This could be done having an archive of the issued certificates and CRLs the
validity period of a revoked certificate will be notBefore -> revDate. Many
laws also require archives to keep information for at least 10 years. At
least in Europe.

-- 

C'you,

	Massimiliano Pala

--o-------------------------------------------------------------------------
Massimiliano Pala [OpenCA Project Manager]                madwolf@openca.org
                                                     madwolf@hackmasters.net
http://www.openca.org                            Tel.:   +39 (0)59  270  094
http://openca.sourceforge.net                    Mobile: +39 (0)347 7222 365