Skip to content

Commit 0375140

Browse files
committed
CRL challenges
1 parent 5a4314f commit 0375140

File tree

1 file changed

+16
-1
lines changed

1 file changed

+16
-1
lines changed

key-distro.rst

Lines changed: 16 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -265,7 +265,7 @@ certificate. Why is this important? Suppose that you suspect that
265265
someone has discovered your private key. There may be any number of
266266
certificates in the universe that assert that you are the owner of the
267267
public key corresponding to that private key. The person who discovered
268-
your private key thus has everything he needs to impersonate you: valid
268+
your private key thus has everything required to impersonate you: valid
269269
certificates and your private key. To solve this problem, it would be
270270
nice to be able to revoke the certificates that bind your old,
271271
compromised key to your identity, so that the impersonator will no
@@ -286,6 +286,21 @@ certificate when it is issued. Thus, we can limit the length of time
286286
that a revoked certificate needs to stay on a CRL. As soon as its
287287
original expiration date is passed, it can be removed from the CRL.
288288

289+
In practice, certificate revocation has proven to be challenging. CRLs
290+
can become very long, so retrieving them becomes costly. The time to
291+
retrieve a CRL may fall in the critical path for opening a
292+
connection to a web site, increasing the time to load a
293+
page substantially. A determined attacker who has compromised a
294+
private key is motivated to disrupt the distribution of the CRL to
295+
prolong the amount of time they can use the compromised key. A number
296+
of proposals have been made to improve the effectiveness of
297+
certificate revocation, such as using bit vectors or other compact
298+
representations of the CRL to reduce its size, and the development of
299+
the Online Certification Status Protocol (OCSP) to enable real-time
300+
checks on a certificate's status. At the time of writing, there are
301+
some best practices for handling certificate revocation but no
302+
comprehensive solution.
303+
289304
4.2 Distribution of Secret Keys
290305
------------------------------------
291306

0 commit comments

Comments
 (0)