Okay didnt know that one yet.
Am 18.04.2016 18:32 schrieb "Richard Barnes" <r...@ipv.sx>:

> You can already revoke with the cert key.
>
> On Mon, Apr 18, 2016 at 12:30 PM, Philipp Junghannß <
> teamhydro55...@gmail.com> wrote:
>
>> In my opinion it would be also nice if you could revoke with the cert key
>> making it possible to remove the cert even if the acc is down.
>> Am 18.04.2016 18:15 schrieb "sheel.at" <pub...@sheel.at>:
>>
>>> Suppose an account key gets compromised. To prevent abuse, the owner can
>>> delete the account:
>>>
>>> https://github.com/ietf-wg-acme/acme/blob/master/draft-ietf-acme-acme.md#deleting-an-account
>>> However, people having the key can simply change it without any effort:
>>>
>>> https://github.com/ietf-wg-acme/acme/blob/master/draft-ietf-acme-acme.md#account-key-roll-over
>>>
>>> What happens if the attacker does so before the owner can react, or even
>>> before the owner notices anything of the breach?
>>>
>>> I suggest changing tha specs (and implementation) to keep old keys after
>>> changes for while. More specifically:
>>> * When an account key is rolled over, the old key is kept for eg. 30
>>> days.
>>> * Multiple changes within this 30 days mean that there are multiple old
>>> keys.
>>> * Account deletion is possible with any of the saved keys, be it old or
>>> new.
>>> * Everything else (other than account deletion) only accepts the new
>>> (newest) key.
>>>
>>> Related:
>>> The owner has no possibiliy to revoke certificates issued by the
>>> attacker. For proper uses, nuking all certs when deleting the account
>>> might be not what the users like, but for the attack scenarion...
>>>
>>> Related 2 (yeah, it's getting bothersome)
>>> If there is an "optional" certificate nuking when deleting accounts, the
>>> attacker could issue certificates and then delete the accountwithout
>>> destroying the certificates(the attacker!), to prevent the real owner
>>> from destroying the certificates. Meaning, a "partially" deleted account
>>> has to stay around for ... as long as there are non-expired
>>> certificates?, just for the possibility that someone wants to delete the
>>> rest too. (But without being useful for anything else other than
>>> deleting)
>>>
>>> ...
>>> I'm rather new to the Let'sEncrypt internals, so if I missed the fact
>>> that there is a solution already, please forgive me.
>>>
>>> Otherwise, sorry, I know spec'ing and implementing this would be
>>> annoying. But without this, the possibility for deleting an account key
>>> is not particularly useful.
>>>
>>>
>>> _______________________________________________
>>> Acme mailing list
>>> Acme@ietf.org
>>> https://www.ietf.org/mailman/listinfo/acme
>>>
>>
>> _______________________________________________
>> Acme mailing list
>> Acme@ietf.org
>> https://www.ietf.org/mailman/listinfo/acme
>>
>>
>
_______________________________________________
Acme mailing list
Acme@ietf.org
https://www.ietf.org/mailman/listinfo/acme

Reply via email to