RE: Online Certificate Revocation Protocol

Santosh Chokhani <chokhani@cygnacom.com> Mon, 11 June 2001 17:16 UTC

Received: from above.proper.com (above.proper.com [208.184.76.39]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA15192 for <pkix-archive@odin.ietf.org>; Mon, 11 Jun 2001 13:16:42 -0400 (EDT)
Received: from localhost (localhost [[UNIX: localhost]]) by above.proper.com (8.11.3/8.11.3) id f5BGBFV08180 for ietf-pkix-bks; Mon, 11 Jun 2001 09:11:15 -0700 (PDT)
Received: from SOTTMXS01.entrust.com (gatekeeper.entrust.com [204.101.128.170]) by above.proper.com (8.11.3/8.11.3) with ESMTP id f5BGBDJ08176 for <ietf-pkix@imc.org>; Mon, 11 Jun 2001 09:11:13 -0700 (PDT)
Received: by SOTTMXS01.entrust.com with Internet Mail Service (5.5.2650.21) id <MWVKQXT2>; Mon, 11 Jun 2001 12:11:09 -0400
Message-ID: <8D7EC1912E25D411A32100D0B76953978DF4C9@scygmxs01.cygnacom.com>
From: Santosh Chokhani <chokhani@cygnacom.com>
To: "Scherling, Mark" <mscherling@rsasecurity.com>, 'jim' <jimhei@cablespeed.com>, Santosh Chokhani <chokhani@cygnacom.com>
Cc: Tony Bartoletti <azb@llnl.gov>, "Housley, Russ" <rhousley@rsasecurity.com>, pgut001@cs.auckland.ac.nz, ietf-pkix@imc.org
Subject: RE: Online Certificate Revocation Protocol
Date: Mon, 11 Jun 2001 12:01:09 -0400
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2650.21)
Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C0F28F.BB158A10"
Sender: owner-ietf-pkix@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-pkix/mail-archive/>
List-ID: <ietf-pkix.imc.org>
List-Unsubscribe: <mailto:ietf-pkix-request@imc.org?body=unsubscribe>
List-ID: <ietf-pkix.imc.org>

Revocation of a public key certificate whose companion key has been
destroyed is a BAD idea.
 
For example, if the subject of the key is a CA, revocation of that public
key certificate could cause denial of service for all the certificates
issued by that CA.  There is nothing wrong with the certificates.
 
If you do not trust the subject holding the private key and claiming it has
been destroyed, that is a different matter.  It is not a key destruction,
but trust issue.
 
Also, just because a private key is no longer being used, does NOT mean that
you do not anticipate it being compromised.  If you find out that the key
may have been discovered (most likely through cryptanalysis), you can revoke
the certificate and claim the suspected date of compromise to be some time
between when the key was destroyed and when you discovered it was
discovered.
 
In short, if you trust a key to be destroyed, that event alone is NOT a
basis for revocation.  Actually, revocation does some harm: causes
unwarranted, PKI built-in, denial of service.

-----Original Message-----
From: Scherling, Mark [mailto:mscherling@rsasecurity.com]
Sent: Monday, June 11, 2001 12:01 PM
To: 'jim'; Santosh Chokhani
Cc: Tony Bartoletti; Housley, Russ; pgut001@cs.auckland.ac.nz;
ietf-pkix@imc.org
Subject: RE: Online Certificate Revocation Protocol


I totally agree with the revocation of the key.  If it came to a test in a
legal court that tried to determine if the key used was destroyed prior to
use, it would be difficult to define the exact moment of destruction as
compared to the usage since there is no record of the key being destroyed.
Whereas there is a record of the key being revoked.  So in all instances
revoke the key, at least there is a time and date stamp of the instance of
revocation.  That would hold more weight in a legal instance than someone
stating or denying the destruction of the private key.

-----Original Message-----
From: jim [mailto:jimhei@cablespeed.com]
Sent: Friday, June 08, 2001 5:33 PM
To: Santosh Chokhani
Cc: Tony Bartoletti; Housley, Russ; pgut001@cs.auckland.ac.nz;
ietf-pkix@imc.org
Subject: Re: Online Certificate Revocation Protocol


I usually try to keep a low profile, but cannot help but get involved.
There is absolutely a need for revoking keys, even if they were destroyed.
If I were conducting a high-risk operation (large sales, financial
responsibilites, life responsibilities in the medical community, national
defense, etc.), I would not trust any system where keys were not revoked
just because someone reported them destroyed.  The associated key could
certainly be reproduced for later usage if someone were able to figure out
what was being used, and without revocation, there would be no way to ensure
that they usage of the key did not continue after the reported destruction.
When a key is no longer to be used other than at the end of its validity
period, it must be place on a CRL to end usage of it altogether. 

I have stated it pretty strongly, but I feel that way about it.  The problem
then becomes one of determining the risk mitigation with lost keys and
ensuring that the mitigation is as stringent as possible to ensure less
risk.  It is a matter of trust if the CP and CPS do not call for revocation
and will certainly disqualify the users of such keys from access to areas
where their certification is not considered suitable.  If the ability to put
trust into a certificate that is then used to authenticate a user so that
user can access information or workflow that they would not otherwise be
able to access, then the business decision behind using that form of trust
must make the risk mitigation decision to reduce the amount of trust that
can be divested into a certificate from a system that does not revoke it
because it is reported by the user to be destroyed.  For a system to be
validated, registration and certificate issuance have to be upheld by having
practices as strong for certificate revocation.  Otherwise, why have a PKI
to begin with? 
Jim Heimberg, ABC, Ph.D. 


Santosh Chokhani wrote: 


  

Destroying a private key used to generate signature may cause some
operational grief in terms of getting a new key certified, but there is no
need for that key any more and hence no revocation is needed. 


Destroying a private decryption key also does not require any revocation,
but underscores the need for key recovery.  Absent key recovery, data
encrypted with the public key companion to the lost private key, can not be
decrypted. 


-----Original Message----- 
From: Tony Bartoletti [ mailto:azb@llnl.gov <mailto:azb@llnl.gov> ] 
Sent: Friday, June 08, 2001 5:31 PM 
To: Housley, Russ; pgut001@cs.auckland.ac.nz 
Cc: ietf-pkix@imc.org 
Subject: Re: Online Certificate Revocation Protocol 


At 04:47 PM 6/8/01 -0400, Housley, Russ wrote: 
>Peter: 
> 
>You make an interesting point.  I figure that a message signed with the 
>private key that is claiming to be compromised is a good thing to pay 
>attention to. 
> 
>If the message is from the subscriber, then that subscriber probably knows 
>that some bad thing just happened and the subscriber is trying to let 
>everyone know.  He does not want any one to rely on the key any more. 
> 
>If the message is not from the subscriber, then the key has absolutely 
>been compromised.  What a nice attacker to tell everyone. 
> 
>Russ 


Indeed.  I have often considered that a revocation request signed with the 
corresponding private key is one of the few things in this world one can 
act upon reliably.  If we could build whole systems on such principles, 
we'd be home free. 


A question:  If one discovers that they have accidently destroyed their 
private key (and there is no evidence of compromise), are they under any 
particular obligation to request revocation?  Is there any liability, or 
other real "downside" to simply getting a new key and keeping mum about the 
fate of the former key? 


(I ask, because this seems the only case where a revocation request could 
NOT be signed by the key in question.) 


___tony___ 


>At 04:34 AM 6/9/2001 +0000, Peter Gutmann wrote: 
>>Nada Kapidzic Cicovic <nada@entegrity.com> writes: 
>> 
>> >This is exactly what CMP specifies. Many vendors already have support 
>> for CMP 
>> >EE initiated certificate revocation. The interoperability of different 
>> >implementations of CMP certificate revocation (among other things) has
been 
>> >conducted during PKI Forum and ICSA CMP interop testing quite
successfully. 
>> 
>>However there are two ways to look at revocation, the DOS model and the
scram 
>>switch model.  The DOS model says that anyone who can revoke your cert can

>>cause a DOS, so it should be made as difficult as humanly possible to 
>>revoke a 
>>cert.  The scram switch model says that when your private key is
compromised 
>>you want the cert revoked right now with no excuses, so it should be made
as 
>>easy as possible to revoke a cert.  CMP follows the DOS model and makes 
>>it very 
>>difficult (in some cases impossible) to revoke your cert.  Programs like
PGP 
>>follow the scram switch model (via suicide-note revocations) and make it
very 
>>easy to revoke your cert.  Depending on your point of view, CMP may not 
>>be the 
>>right thing for handling revocations. 
>> 
>>Peter. 


Tony Bartoletti 925-422-3881 <azb@llnl.gov> 
Information Operations, Warfare and Assurance Center 
Lawrence Livermore National Laboratory 
Livermore, CA 94551-9900