[18213] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: How many wrongs do you need to make a right?

daemon@ATHENA.MIT.EDU (Florian Weimer)
Wed Aug 17 11:04:54 2005

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
From: Florian Weimer <fw@deneb.enyo.de>
To: "Steven M. Bellovin" <smb@cs.columbia.edu>
Cc: pgut001@cs.auckland.ac.nz (Peter Gutmann),
	cryptography@metzdowd.com
Date: Wed, 17 Aug 2005 15:24:17 +0200
In-Reply-To: <20050817124019.0584A3BFDC5@berkshire.machshav.com> (Steven
	M. Bellovin's message of "Wed, 17 Aug 2005 08:40:19 -0400")

* Steven M. Bellovin:

> In message <87br3wdal7.fsf@mid.deneb.enyo.de>, Florian Weimer writes:
>
>>
>>Can't you strip the certificates which have expired from the CRL?  (I
>>know that with OpenPGP, you can't, but that's a different story.)
>>
>>OTOH, I wouldn't be concerned by the file size, although it's
>>certainly annoying.  I would be really worried that the contents of
>>that CRL leaks sensitive information.  At least from a privacy point
>>of view, this is a big, big problem, especially if you include some
>>indication which allows you to judge the validity of old signatures.
>>
>
> One can easily conceive of schemes that don't have such problems, such 
> as simply publishing the hash of revoked certificates, or using a Bloom 
> filter based on the hashes.

This doesn't completely eliminate the data leak, as a long as the
certificates were used in end-to-end communications.  Analysis for
relative outsiders becomes harder, though.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post