[OpenID] OpenID/Debian PRNG/DNS Cache poisoning advisory

Gerald Beuchelt beuchelt at sun.com
Fri Aug 8 17:44:07 UTC 2008


Dick Hardt wrote:
> On 8-Aug-08, at 10:11 AM, Ben Laurie wrote:
>   
>> It also only fixes this single type of key compromise. Surely it is
>> time to stop ignoring CRLs before something more serious goes wrong?
>>     
>
> Clearly many implementors have chosen to *knowingly* ignore CRLs  
> despite the security implications, so my take away would be that the  
> current public key infrastructure is flawed.
>
>   
    Well, they might have done this *knowingly*, but--at least for 
some--I doubt that they *know* what they have done. IMO, it is bad 
practice to implement only half of a protocol/standard for any reason 
(especially out of laziness or ignorance), but that is what using 
certificates without CRL checking amounts to.

    If we believe that the current PKI was truly flawed, it would be an 
act of gross negligence to use it for anything requiring a properly 
secured communication channel.

    To extend Ben's advice: Decide if you want to use the current PKI. 
If so, implement CRL checking.

Gerald
> -- Dick
>
> _______________________________________________
> general mailing list
> general at openid.net
> http://openid.net/mailman/listinfo/general
>   

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-general/attachments/20080808/047ddd9f/attachment-0001.htm>


More information about the general mailing list