On 22/07/16 13:21, Chris Drake wrote:
Hi Yaron,

Best I can tell, everyone has jumped onto solving a cool problem,
without there actually being any reason to solve it?

I asked about the use case, and CDN authority revocation was all I got
(imho a really *weak* reason).  Maybe I got it wrong?

What *exactly* is a use case for short-term certificates? What about
HSTS/HPKP?
Why would *any* expired short-term certificate be useful?  Practically
no ordinary user cares about bad certs - heck - iPhone users don't even
have a way to check a cert even if they wanted to.

Kind Regards,
Chris Drake


Hi Chris,

Can you please explain why CDN authority revocation is a weak use case?

Let me share my preferred use case: I am running a large web property in the cloud, where TLS connections are terminated on a cloud-based load balancer (Amazon ELB, for a concrete example). I would like the cloud provider to present my identity (www.example.com), but I want to revoke this authority as soon as something bad happens, e.g. the cloud provider is breached.

There may be alternative solutions, but I think short-term certs are a reasonable solution here. Either the content owner gives the cloud provider a new cert every X days (option 1), or the cloud provider can get the short-term cert directly from the CA (option 2).

A solution that certainly CANNOT work is to give the cloud provider a regular 1-year cert and revoke it if a breach occurs. Because we know that cert revocation doesn't work.

Thanks,
        Yaron

_______________________________________________
Acme mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/acme

Reply via email to