21.03.2013 Views

Problem - Kevin Tafuro

Problem - Kevin Tafuro

Problem - Kevin Tafuro

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Certificate revocation<br />

What happens if an attacker steals an entity’s private key? When that happens, the<br />

attacker can decrypt anything intended for the entity. The attacker can also forge<br />

digital signatures as if they came from that entity. In short, the attacker can masquerade<br />

as the rightful owner of the certificate.<br />

Once a certificate has been issued, it is normally put into production, where it will<br />

generally be distributed to many clients. If an attacker compromises the associated<br />

private key, the attacker now has the ability to use the certificate even though it<br />

doesn’t belong to the attacker. Assuming that the proper owner is aware of the compromise,<br />

a new certificate with a new key pair should be obtained and put into use.<br />

Now there will be two certificates out there for the same entity, and both are technically<br />

valid because they both contain a valid CA signature. However, one of them<br />

clearly should not be trusted. The compromised certificate will eventually expire, but<br />

in the meantime, how will the world at large know not to trust it?<br />

The answer lies in something called a certificate revocation list (CRL). A CRL(shown<br />

in Figure 10-3) contains a list of all of the revoked certificates a CA has issued that<br />

have yet to expire. When a certificate is revoked, the CA is declaring that the certificate<br />

should not be trusted.<br />

Request CRLs<br />

Certification<br />

Authority<br />

Send CRLs<br />

Client Server<br />

Figure 10-3. Clients should retrieve CRLs from the CA that issued a certificate<br />

Bandwidth is a significant concern when distributing CRLs, because clients need to<br />

have reasonably current revocation information to properly validate a certificate. In<br />

an ideal world, the client would get up-to-date revocation information as soon as the<br />

CA gets the information. Unfortunately, many CAs distribute CRLs only as a huge<br />

list. Downloading a huge list before validating each certificate could easily add unacceptable<br />

latency and would place undue load on the server when there are many clients.<br />

As a result, CAs tend to update their CRLs regularly, but not immediately after<br />

Understanding Public Key Infrastructure (PKI) | 507<br />

This is the Title of the Book, eMatter Edition<br />

Copyright © 2007 O’Reilly & Associates, Inc. All rights reserved.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!