Peter, "Compromised" in the context must necessarily mean "someone stole the 
key", because if someone "broke the crypto" - then none of the certs issued by 
that CA is worth the weight of electrons that carried it.

Oh, and could you please be a little more constructive?
-- 
V/R,
Uri
 

On 10/7/22, 13:05, "TLS on behalf of Peter Gutmann" <tls-boun...@ietf.org on 
behalf of pgut...@cs.auckland.ac.nz> wrote:

    Tim Hollebeek <tim.holleb...@digicert.com> writes:

    >There’s also the problem that there’s no standard for secure proof of
    >possession for revocation, despite a number of us calling for one for 
years.

    This is one of the 8,000 (approximately) great unresolved PKIX disagreements
    where about half of PKIX thought revocation should be made as easy as 
possible
    to be able to deal with things like compromised keys [0] and the other half 
of
    PKIX thought it should be made as difficult as possible to be able to deal
    with DoS via hostile revocations (during one of the interminable debates
    around this, one of the participants suggested that supplicants should be
    required to fly to the CA's place of business and beg them on their knees to
    revoke the cert).  The difficult-as-possible side mostly won in the 
standards
    (e.g. the CMP requirement to sign a revocation request for a key you've lost
    before it can be revoked) while the easy-as-possible mostly won in practice
    because that's what people actually wanted.

    Peter.

    [0] "Compromised" meaning someone broke the crypto, not stole the key, since
        that's not supposed to happen.

    _______________________________________________
    TLS mailing list
    TLS@ietf.org
    https://www.ietf.org/mailman/listinfo/tls

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to