TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

A New Life for Certificate Revocation Lists

121 pointsby grapplerover 2 years ago

11 comments

xoaover 2 years ago
I was kind of surprised that OCSP stapling didn&#x27;t get any mention at all. I thought that was a major improvement in both resource cost and privacy? Since the time stamped response is proxied by the site operator rather then going directly to the CA, the load is almost entirely switched to the site itself, and the site itself is the only one who knows a given IP is asking for it, which is fine because obviously the site knows a given browser is connecting to it anyway. It&#x27;s decentralized again. I vaguely remember at one point there was a major limitation of only supporting a single OCSP response at a time but I thought that was dealt with via a later RFC and then entirely obviated as an issue by TLS 1.3.<p>Did something happen there or some other significant issue get discovered? I&#x27;m curious why the move back to CRLs (albeit improved) vs must-staple. It seemed like a reasonable elegant and straight forward solution that fit the web pretty well.
评论 #32755371 未加载
评论 #32755310 未加载
评论 #32757502 未加载
评论 #32755356 未加载
评论 #32757941 未加载
luhnover 2 years ago
&gt; If we had an incident where we needed to revoke every single one of those certificates at the same time, the resulting CRL would be over 8 gigabytes.<p>I don&#x27;t know much about this stuff, so apologies if this is a silly question:<p>If you needed to revoke all the certificates, couldn&#x27;t you just revoke the handful of intermediary certificates and call it a day? I assume you&#x27;d want to revoke them anyways if there&#x27;s a situation severe enough that merits revoking 200 million certificates.
评论 #32757534 未加载
评论 #32755942 未加载
frankjrover 2 years ago
&gt; This means that they’re often very large – easily the size of a whole movie.<p>Couldn&#x27;t they just use actual units? This says absolutely nothing.
评论 #32757948 未加载
评论 #32811330 未加载
评论 #32757484 未加载
ok_dadover 2 years ago
Browsers and CAs still deciding for the user what&#x27;s best with yet another centralized database that we have to &quot;trust&quot; is complete and implemented correctly. I don&#x27;t see how this is so hard: just let us download the CRLs. Maybe add them on a torrent-like system so they can be shared (and validated) peer-to-peer, or at least have hundreds or thousands of mirrors that can provide that data. All this &quot;it&#x27;s too big and the user would have to download it&quot; bullshit is just pushing us more and more into &quot;computing as a service&quot;; aka: we OWN your digital life.<p>Edit: I was partly wrong, this is a good thing because you CAN download the CRLs now (see comments below here for info), whereas previously you couldn&#x27;t. Your browser still probably won&#x27;t support a full CRL download, but I could be pleasantly surprised.
评论 #32755509 未加载
weinzierlover 2 years ago
&gt; <i>&quot;They process the CRLs into a smaller format such as a Bloom filter, then push the new compressed object to all of the installed browser instances using pre-existing rapid update mechanisms. Firefox, for example, is pushing updates as quickly as every 6 hours.&quot;</i><p>Does anyone know what the rate of revocations is?<p>I can easily imagine a situation where it is high enough to cause a browser update every few hours. That is for every installed browser, because - as they say in the article - Browser-Summarized CRLs are <i>&quot;proprietary, browser-specific CRLs&quot;</i>. Moreover there are non-browser clients which we must consider if we are to take this proposal seriously.<p>------<p>My quick back of the envelope estimation:<p>CRL size: 4GiB (they say in the article that it could be easily the size of a movie)<p>Average Cert Size: 75 bytes (first hit in Google, no idea if reliable number)<p>Time Span: 825 days (CRLs have only unexpired certs and ones older than 825 should all be expired)<p>4GiB&#x2F;(75B&#x2F;cert)&#x2F;825days = 69141 certs&#x2F;day<p>Sounds way too high to me. Where am I wrong?
评论 #32762815 未加载
cryptonectorover 2 years ago
&gt; There’s still a long way to go before revocation in the Web PKI is truly fixed.<p>It won&#x27;t be fixed until we have name constraints on CA certificates, and a way to decorate trust anchors with local policy name constraints.
OrvalWintermuteover 2 years ago
Lots of this information is completely bogus.<p>&gt; But because OCSP infrastructure has to be running constantly and can suffer downtime just like any other web service, most browsers treat getting no response at all as equivalent to getting a “not revoked” response. This means that attackers can prevent you from discovering that a certificate has been revoked simply by blocking all of your requests for OCSP information.<p>This is false. Non-nonce OCSP is inherently cachable, and replayable. That means you can have your own HA setups with HA OCSP clients talking to HA OCSP servers (repeaters &amp; responders) backed up by caching in commercial CDNs, and local caching servers like bluecoats.<p>Likewise, OCSP stapling helps remove much of the performance and privacy issues, pushing it to the serving webserver.<p>Beyond this, you can just use squid or localized HA OCSP services, and do some DNS rewriting to support it even more HA.<p>Nonced OCSP is the rare beast that needs to be online, but there are HA OCSP with smart OCSP clients.<p>&gt; To help reduce load on a CA’s OCSP services, OCSP responses are valid and can be cached for about a week. But this means that clients don’t retrieve updates very frequently, and often continue to trust certificates for a week after they’re revoked.<p>Trust Stores are inherently manageable. The lag around revocation completely depends on CRL&#x2F;OCSP publishing, and client update requests.<p>&gt; And perhaps worst of all: because your browser makes an OCSP request for every website you visit, a malicious (or legally compelled) CA could track your browsing behavior by keeping track of what sites you request OCSP for.<p>This is why we advocate OCSP Stapling and use of CDNs for OCSP &amp; CRL cache hits. Furthermore, localized OCSP mentioned above decentralizes this even further.<p>&gt; So both of the existing solutions don’t really work: CRLs are so inefficient that most browsers don’t check them, and OCSP is so unreliable that most browsers don’t check it. We need something better.<p>CRLs &amp; OCSP work pretty well when actually supported.<p>When Diginotar happened I polled every single publicly available commercial CA - strangely, a ton of them were not producing any CRL&#x2F;OCSP at all, putting clients into a fail-open mode.<p>Lesson of the story: don&#x27;t blame a protocol for lazy CAs, bad implementations, or the lack of operational excellence from many vendors.
phlip9over 2 years ago
I can&#x27;t wait for some big site certs to false positive in a CRL bloom filter and cause a big outage : )
评论 #32758039 未加载
评论 #32758153 未加载
jnwatsonover 2 years ago
What about if you’re calling an API? Is there compressed CRL support in libcurl or similar?
tinus_hnover 2 years ago
Is certificate revocation really so common a crl of a normal authority is gigabyte sized?
评论 #32757825 未加载
评论 #32756642 未加载
评论 #32754936 未加载
评论 #32756910 未加载
jbverschoorover 2 years ago
Shitty title for an article considering recent events