[144437] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Has any public CA ever had their certificate revoked?

daemon@ATHENA.MIT.EDU (Paul Hoffman)
Fri May 8 13:18:05 2009

In-Reply-To: <200905081602.n48G2Ii4009624@home.unipay.nl>
Date: Fri, 8 May 2009 09:08:03 -0700
To: ray@unipay.nl
From: Paul Hoffman <paul.hoffman@vpnc.org>
Cc: pgut001@cs.auckland.ac.nz, dan@geer.org, thierry.moreau@connotech.com,
        cryptography@metzdowd.com

At 6:02 PM +0200 5/8/09, R. Hirschfeld wrote:
> > Date: Tue, 5 May 2009 10:17:00 -0700
>> From: Paul Hoffman <paul.hoffman@vpnc.org>
>
> > the CA fixed the problem and researched all related problems that it
>> could find.
>
>>From what I've read of the incident (I think it's the one referred
>to), Comodo revoked the bogus mozilla.com cert and got their reseller
>Certstar (who issued it) to start performing validation. 

Correct.

>Security
>common sense might suggest that they validate all certs previously
>issued by Certstar and check the validation procedures of their other
>resellers.  Do you know whether they did so? 

Comodo publicly said they did. That's why I said "researched all related problems that it could find".

>The former seems a major
>undertaking and commercially delicate.

And yet they appear to have done it.

--Paul Hoffman, Director
--VPN Consortium

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post