Re: [pkix] Managing Long-Lived CA certs
"Dr. Pala" <director@openca.org> Mon, 17 July 2017 16:29 UTC
Return-Path: <director@openca.org>
X-Original-To: pkix@ietfa.amsl.com
Delivered-To: pkix@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1])
by ietfa.amsl.com (Postfix) with ESMTP id ECEA1131C95
for <pkix@ietfa.amsl.com>; Mon, 17 Jul 2017 09:29:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.343
X-Spam-Level:
X-Spam-Status: No, score=-0.343 tagged_above=-999 required=5
tests=[BAYES_00=-1.9, HTML_IMAGE_ONLY_20=1.546, HTML_MESSAGE=0.001,
SPF_PASS=-0.001, T_HK_NAME_DR=0.01, URIBL_BLOCKED=0.001]
autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44])
by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id n7MfJgH7dLT3 for <pkix@ietfa.amsl.com>;
Mon, 17 Jul 2017 09:29:09 -0700 (PDT)
Received: from mail.katezarealty.com (mail.katezarealty.com [104.168.158.213])
by ietfa.amsl.com (Postfix) with ESMTP id B75DD128BC8
for <pkix@ietf.org>; Mon, 17 Jul 2017 09:29:08 -0700 (PDT)
Received: from dhcp-8e48.meeting.ietf.org (dhcp-8e48.meeting.ietf.org
[31.133.142.72])
(using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
(No client certificate requested)
by mail.katezarealty.com (Postfix) with ESMTPSA id 117123740A29
for <pkix@ietf.org>; Mon, 17 Jul 2017 12:29:07 -0400 (EDT)
To: pkix@ietf.org
References: <467c8936-f6aa-0853-878c-24fc8803c599@openca.org>
<D5925287.981D0%carl@redhoundsoftware.com>
From: "Dr. Pala" <director@openca.org>
Organization: OpenCA Labs
Message-ID: <8fee3040-d629-762b-f5b0-b8e770911639@openca.org>
Date: Mon, 17 Jul 2017 18:29:05 +0200
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.12; rv:52.0)
Gecko/20100101 Thunderbird/52.2.1
MIME-Version: 1.0
In-Reply-To: <D5925287.981D0%carl@redhoundsoftware.com>
Content-Type: multipart/alternative;
boundary="------------1DB84F40E49D16D7D75E23E2"
Content-Language: en-US
Archived-At: <https://mailarchive.ietf.org/arch/msg/pkix/gfppLLIVHxBkmJfZ-nFrO29znWM>
Subject: Re: [pkix] Managing Long-Lived CA certs
X-BeenThere: pkix@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: PKIX Working Group <pkix.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pkix>,
<mailto:pkix-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pkix/>
List-Post: <mailto:pkix@ietf.org>
List-Help: <mailto:pkix-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pkix>,
<mailto:pkix-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Jul 2017 16:29:10 -0000
Hi Carl, you are totally right :D That case would be covered by the revocation of the CA key. However, there are also other types of compromises (e.g., the system is compromised, but the key is not - certificates issued by non-authorized person). Keep in mind that in the ecosystem where this happens (device certs and many others) certificate revocation is not really checked... this would limit the exposure for non-catastrophic compromise events. Does this make sense ? What do you think ? Cheers, Max [*] = I know that checking revocation is still, regrettably, not common... On 7/17/17 5:42 PM, Carl Wallace wrote: > [...] > [CW] Wouldn't the protection need to come in the form of revocation? > If the CA key is compromised, the validity period in certificates > cannot be trusted. [...] -- Best Regards, Massimiliano Pala, Ph.D. OpenCA Labs Director OpenCA Logo
- [pkix] Managing Long-Lived CA certs Dr. Pala
- Re: [pkix] Managing Long-Lived CA certs Rob Stradling
- Re: [pkix] Managing Long-Lived CA certs Dr. Pala
- Re: [pkix] Managing Long-Lived CA certs Erik Andersen
- Re: [pkix] Managing Long-Lived CA certs Dr. Pala
- Re: [pkix] Managing Long-Lived CA certs Erik Andersen
- Re: [pkix] Managing Long-Lived CA certs Carl Wallace
- Re: [pkix] Managing Long-Lived CA certs Dr. Pala
- Re: [pkix] Managing Long-Lived CA certs Santosh Chokhani
- Re: [pkix] Managing Long-Lived CA certs Dr. Pala
- Re: [pkix] Managing Long-Lived CA certs Carl Wallace
- Re: [pkix] Managing Long-Lived CA certs Dr. Pala
- Re: [pkix] Managing Long-Lived CA certs Peter Gutmann
- Re: [pkix] Managing Long-Lived CA certs Erik Andersen
- Re: [pkix] Managing Long-Lived CA certs David A. Cooper
- Re: [pkix] Managing Long-Lived CA certs Peter Gutmann
- Re: [pkix] Managing Long-Lived CA certs David A. Cooper
- Re: [pkix] Managing Long-Lived CA certs Peter Gutmann
- Re: [pkix] Managing Long-Lived CA certs Erik Andersen
- Re: [pkix] Managing Long-Lived CA certs swilson
- Re: [pkix] Managing Long-Lived CA certs Dr. Pala
- Re: [pkix] Managing Long-Lived CA certs Anders Rundgren
- Re: [pkix] Managing Long-Lived CA certs Carl Wallace
- Re: [pkix] Managing Long-Lived CA certs Denis
- Re: [pkix] Managing Long-Lived CA certs EG Giessmann
- Re: [pkix] Managing Long-Lived CA certs Dr. Pala
- Re: [pkix] Managing Long-Lived CA certs Dr. Pala
- [pkix] Upgradable/Replaceable IoT systems. Re: Ma… Anders Rundgren
- [pkix] Connected Cars. Upgradable/Replaceable IoT… Anders Rundgren
- Re: [pkix] Connected Cars. Upgradable/Replaceable… Robert Moskowitz
- Re: [pkix] Connected Cars. Upgradable/Replaceable… Peter Gutmann
- Re: [pkix] Connected Cars. Upgradable/Replaceable… Robert Moskowitz
- Re: [pkix] Connected Cars. Upgradable/Replaceable… Erwann Abalea