[OpenID] OpenID/Debian PRNG/DNS Cache poisoning advisory
Gerald Beuchelt
beuchelt at sun.com
Fri Aug 8 17:44:07 UTC 2008
Dick Hardt wrote:
> On 8-Aug-08, at 10:11 AM, Ben Laurie wrote:
>
>> It also only fixes this single type of key compromise. Surely it is
>> time to stop ignoring CRLs before something more serious goes wrong?
>>
>
> Clearly many implementors have chosen to *knowingly* ignore CRLs
> despite the security implications, so my take away would be that the
> current public key infrastructure is flawed.
>
>
Well, they might have done this *knowingly*, but--at least for
some--I doubt that they *know* what they have done. IMO, it is bad
practice to implement only half of a protocol/standard for any reason
(especially out of laziness or ignorance), but that is what using
certificates without CRL checking amounts to.
If we believe that the current PKI was truly flawed, it would be an
act of gross negligence to use it for anything requiring a properly
secured communication channel.
To extend Ben's advice: Decide if you want to use the current PKI.
If so, implement CRL checking.
Gerald
> -- Dick
>
> _______________________________________________
> general mailing list
> general at openid.net
> http://openid.net/mailman/listinfo/general
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-general/attachments/20080808/047ddd9f/attachment-0001.htm>
More information about the general
mailing list