@@ -265,7 +265,7 @@ certificate. Why is this important? Suppose that you suspect that
265265someone has discovered your private key. There may be any number of
266266certificates in the universe that assert that you are the owner of the
267267public key corresponding to that private key. The person who discovered
268- your private key thus has everything he needs to impersonate you: valid
268+ your private key thus has everything required to impersonate you: valid
269269certificates and your private key. To solve this problem, it would be
270270nice to be able to revoke the certificates that bind your old,
271271compromised key to your identity, so that the impersonator will no
@@ -286,6 +286,21 @@ certificate when it is issued. Thus, we can limit the length of time
286286that a revoked certificate needs to stay on a CRL. As soon as its
287287original expiration date is passed, it can be removed from the CRL.
288288
289+ In practice, certificate revocation has proven to be challenging. CRLs
290+ can become very long, so retrieving them becomes costly. The time to
291+ retrieve a CRL may fall in the critical path for opening a
292+ connection to a web site, increasing the time to load a
293+ page substantially. A determined attacker who has compromised a
294+ private key is motivated to disrupt the distribution of the CRL to
295+ prolong the amount of time they can use the compromised key. A number
296+ of proposals have been made to improve the effectiveness of
297+ certificate revocation, such as using bit vectors or other compact
298+ representations of the CRL to reduce its size, and the development of
299+ the Online Certification Status Protocol (OCSP) to enable real-time
300+ checks on a certificate's status. At the time of writing, there are
301+ some best practices for handling certificate revocation but no
302+ comprehensive solution.
303+
2893044.2 Distribution of Secret Keys
290305------------------------------------
291306
0 commit comments