[110296] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Security team successfully cracks SSL using 200 PS3's and MD5

daemon@ATHENA.MIT.EDU (Steven M. Bellovin)
Fri Jan 2 12:06:49 2009

Date: Fri, 2 Jan 2009 12:06:36 -0500
From: "Steven M. Bellovin" <smb@cs.columbia.edu>
To: "Terje Bless" <link@pobox.com>
In-Reply-To: <47ac005a0901020853v2e46b07cr8c09a92e746d505e@mail.gmail.com>
Cc: NANOG <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org

On Fri, 2 Jan 2009 17:53:55 +0100
"Terje Bless" <link@pobox.com> wrote:

> On Fri, Jan 2, 2009 at 5:44 PM,  <Valdis.Kletnieks@vt.edu> wrote:
> > Hmm... so basically all deployed FireFox and IE either don't even
> > try to do a CRL, or they ask the dodgy certificate "Who can I ask
> > if you're dodgy?"
> 
> Hmm. Don't the shipped-with-the-browser trusted root certificates
> include a CRL URL?
> 
> 
Every CA runs its own CRL server -- it has to be that way.


		--Steve Bellovin, http://www.cs.columbia.edu/~smb


home help back first fref pref prev next nref lref last post