Re: Online Certificate Revocation Protocol

thayes@netscape.com (Terry Hayes) Tue, 12 June 2001 19:57 UTC

Received: from above.proper.com (above.proper.com [208.184.76.39]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA23548 for <pkix-archive@odin.ietf.org>; Tue, 12 Jun 2001 15:57:52 -0400 (EDT)
Received: from localhost (localhost [[UNIX: localhost]]) by above.proper.com (8.11.3/8.11.3) id f5CIon011948 for ietf-pkix-bks; Tue, 12 Jun 2001 11:50:49 -0700 (PDT)
Received: from netscape.com (r2d2.netscape.com [205.217.237.47]) by above.proper.com (8.11.3/8.11.3) with ESMTP id f5CIomJ11943 for <ietf-pkix@imc.org>; Tue, 12 Jun 2001 11:50:48 -0700 (PDT)
Received: from judge.mcom.com (judge.mcom.com [205.217.237.53]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5CInvr02880 for <ietf-pkix@imc.org>; Tue, 12 Jun 2001 11:49:59 -0700 (PDT)
Received: from netscape.com ([192.18.121.215]) by judge.mcom.com (Netscape Messaging Server 4.15) with ESMTP id GETYZ902.NU7; Tue, 12 Jun 2001 11:49:57 -0700
Message-ID: <3B266456.4060803@netscape.com>
Date: Tue, 12 Jun 2001 11:49:58 -0700
From: thayes@netscape.com
User-Agent: Mozilla/5.0 (Windows; U; WinNT4.0; en-US; rv:0.9.1+) Gecko/20010611 Netscape6/6.1b1
X-Accept-Language: en
MIME-Version: 1.0
To: Scherling Mark <mscherling@rsasecurity.com>
CC: Ietf-Pkix <ietf-pkix@imc.org>
Subject: Re: Online Certificate Revocation Protocol
References: <016D1D1E0314D5118A7F00508BD9525272DC35@exvan01.x509.com>
Content-Type: text/plain; charset="us-ascii"; format="flowed"
Content-Transfer-Encoding: 7bit
Sender: owner-ietf-pkix@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-pkix/mail-archive/>
List-ID: <ietf-pkix.imc.org>
List-Unsubscribe: <mailto:ietf-pkix-request@imc.org?body=unsubscribe>
List-ID: <ietf-pkix.imc.org>
Content-Transfer-Encoding: 7bit

Mark,

In this message you use the phrases "after I left the organization" and 
"someone leaves the company". This tells me that your affiliation has 
changed, and therefore any certificate you hold indicating that 
affiliation should be revoked.  This has nothing to do with whether the 
key has been destroyed.

Using the destruction of the key as a replacement for revocation is not 
a good idea for the reasons you give.  However, I see no requirement to 
revoke a certificate for a destroyed key if the subject is otherwise in 
good standing.

Terry

Scherling, Mark wrote:

>The problem is that today we have no way of determining what "hold" means.
>We can suspend a certificate which means it's not available, but my
>preference is to revoke a certificate if the private key is in an unknown
>state, that is we think it was destroyed but there is no way of determining
>if that is absolutely true.  
>
>If you look at a lot of the cyber-thefts, a large percentage was with
>insider knowledge.  It would be easy to say my key has been destroyed and
>then use my key for access to something after I left the organization.  You
>would have proof that the key was destroyed (I signed a piece of paper
>saying so, with date and time, witnessed by my VP, etc.) yet the key was
>used to gain access after the date and time.  It's not a matter of trust,
>but a matter of risk management.  If my key was unknowingly compromised and
>then destroyed, the key is still valid unless we revoke the key.  It is far
>safer than assuming that the key was destroyed.
>
>In the case of a CA key, I would rather revoke all keys and re-issue than
>take the risk that the CA key was destroyed and no other copies exist. 
>
>So we want to restrict the ability to use the key even if it has been
>destroyed because we cannot with absolution determine that the key was
>destroyed and no copies exist.  In many Subscriber Agreements and
>Certificate Policies, it states that the Subscriber may back up their keys
>using proper safeguards as long as they are the only ones with access.  In
>the event that someone leaves a company and their private key was destroyed
>prior to them leaving, the back up key may be in a sealed envelope with the
>passphrase at their desk or in their filing cabinet.  I know that most of us
>would never do this sort of thing but many people do.   So now you are left
>with a key that has not been revoked and is still active.  Would we all not
>consider this a security risk?
>
>The bottom line is that if a private key is in an unknown state, the CA
>should revoke the key.
>
>-----Original Message-----
>From: Carlin Covey [mailto:ccovey@cylink.com]
>Sent: Tuesday, June 12, 2001 9:07 AM
>To: Paul Gogarty; Lynn.Wheeler@firstdata.com; mscherling@rsasecurity.com
>Cc: Ietf-Pkix
>Subject: RE: Online Certificate Revocation Protocol
>
>
>Placing the certificate on hold and using some sort of hold instruction code
>makes sense to me.  But the hold instruction code would have to refer to
>some date after which new signatures are considered invalid.  That
>presupposes a timestamp on the signed document, so there is a trusted
>signature time to compare with the the "no new signatures after ..." time in
>the hold code.  Of course, we could use the private key usage extension to
>specify the time, if the CA, RA or subject of the signature certificate
>knows this time when the certificate is issued.  In an earlier posting Lynn
>Wheeler noted that in such a case the CA/RA functions might be combined with
>the timestamping notary function.
>
>Mark, is this similar to what you had in mind when you mentioned revoking
>the private key?  That is, we want restrictions placed on validation of
>signatures made with the private key based upon when the signatures were
>created.
>
>Regards,
>
>Carlin
>
>____________________________
>
>-  Carlin Covey
>   Cylink Corporation
>
>-----Original Message-----
>From: owner-ietf-pkix@mail.imc.org
>[mailto:owner-ietf-pkix@mail.imc.org]On Behalf Of Paul Gogarty
>Sent: Tuesday, June 12, 2001 8:11 AM
>To: Ietf-Pkix
>Subject: RE: Online Certificate Revocation Protocol
>
>
>
>In cases where keys are destroyed before their revocation date would it not
>make more sense to place the certificate on hold (use a combination of
>'Reason Code' and 'Hold Instruction Code' CRL entry extensions).
>
>This allows the certificate to validate as part of a certification path or
>for signature verification, but provides a date after which signatures from
>the certificate should not be trusted and the encryption key should not be
>used.
>
>	Paul Gogarty
>	ASN.1 Developer
>
>	De La Rue InterClear Ltd.
>	De La Rue House
>	Jays Close
>	Viables
>	Basingstoke
>	England
>	RG22 4BS
>
>	Fax: +44 (0)1256 487755
>	Tel: +44 (0)7879 458416
>	mailto:paul.gogarty@interclear.co.uk
>
>	http://www.interclear.co.uk/
>