[110296] in North American Network Operators' Group
Re: Security team successfully cracks SSL using 200 PS3's and MD5
daemon@ATHENA.MIT.EDU (Steven M. Bellovin)
Fri Jan 2 12:06:49 2009
Date: Fri, 2 Jan 2009 12:06:36 -0500
From: "Steven M. Bellovin" <smb@cs.columbia.edu>
To: "Terje Bless" <link@pobox.com>
In-Reply-To: <47ac005a0901020853v2e46b07cr8c09a92e746d505e@mail.gmail.com>
Cc: NANOG <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org
On Fri, 2 Jan 2009 17:53:55 +0100
"Terje Bless" <link@pobox.com> wrote:
> On Fri, Jan 2, 2009 at 5:44 PM, <Valdis.Kletnieks@vt.edu> wrote:
> > Hmm... so basically all deployed FireFox and IE either don't even
> > try to do a CRL, or they ask the dodgy certificate "Who can I ask
> > if you're dodgy?"
>
> Hmm. Don't the shipped-with-the-browser trusted root certificates
> include a CRL URL?
>
>
Every CA runs its own CRL server -- it has to be that way.
--Steve Bellovin, http://www.cs.columbia.edu/~smb