Customers are probably not relying on it. The key has no place in the protocol 
flow. It is gratuitous, superfluous information.

The vendor simply replaces the certificate(s) everywhere, keeping the private 
key of the new certificate(s), well, private.

Then the vendor revokes the compromised certificate(s).

This process must be applied at whatever level the key applies to. If they have 
an in-house CA and are distributing its private key, then they must start over 
with a new CA and revoke every unexpired certificate issued by the old CA. 
Similar logic if the distributed an Intermediate Certificate key.

Charles


-----Original Message-----
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Paul Gilmartin
Sent: Thursday, August 22, 2019 12:42 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: vendor distributes their private key

On Thu, 22 Aug 2019 14:13:58 -0500, Joel M Ivey wrote:

>Thanks all for the response.   I'm glad I wasn't missing something.   I will 
>discuss further with the vendor, hoping they will recognize the risks.
> 
How can the vendor recover from this without causing great
disruption, even an indefinite time in the future, to existing
customers who are rely on the improperly distributed private key?

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to