full-disclosure-uk August 2008 archive
Main Archive Page > Month Archives  > full-disclosure-uk archives
full-disclosure-uk: Re: [Full-disclosure] [OpenID] OpenID/Debian

Re: [Full-disclosure] [OpenID] OpenID/Debian PRNG/DNS Cache poisoning advisory

From: Eddy Nigg (StartCom Ltd.) <eddy_nigg_at_nospam>
Date: Fri Aug 08 2008 - 19:13:41 GMT
To: Dick Hardt <dick@sxip.com>

Dick Hardt:
> On 8-Aug-08, at 10:11 AM, Ben Laurie wrote:
>> It also only fixes this single type of key compromise. Surely it is
>> time to stop ignoring CRLs before something more serious goes wrong?
> Clearly many implementors have chosen to *knowingly* ignore CRLs
> despite the security implications

Please note that Firefox 3 implements OCSP checking which is turned on by default. It's more efficient than CRLs...in that respect also note that some CAs don't support CRL distribution points in the end user certificates nor OCSP at all. Obviously those are details a subscriber should check before purchasing a certificate.

Also subscribers share the responsibilities with the CA in cases such as the Debian fiasco, most CAs have refrained from detecting and revoking affected certificates. Just to make it clear that this problem isn't specific to OpenID but all web sites and we discussed this issue extensively over at Mozilla (dev.tech.crypto).

Regards Signer: Eddy Nigg, StartCom Ltd. <http://www.startcom.org> Jabber: startcom@startcom.org <xmpp:startcom@startcom.org> Blog: Join the Revolution! <http://blog.startcom.org> Phone: +1.213.341.0390

_______________________________________________ Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/