Nelson B wrote:
Ian Grigg wrote:

Mind you, revocations seem rather rare.


Look at the size of any CA's CRL.
Even cacert's CRL seems to have a lot of entries, and seems to
have expanded at a significant rate.


Oh, ok! Now, how many of those are actual
results of compromise? As opposed to routine
replacements or expiries or other benign
effects.


I doubt that any of them are due to mere expiration.
A CRL is never required to list expired certs.
A cert's date of expiration is the end of the issuer's
obligation to carry it in the CRL.
One reason to issue certs with short expiration times (e.g. only
a year, even for keys that are thought to require 50+ years to
break) is to mitigate the amount of information that must be carried
in the issuer's CRL.


Aha!  I always wondered about that.  It occurred
to me that selling 1 year certs was simply and
solely a revenue stream, when the cost of production
was the same for any length.  Now we have a reason,
which is to keep the CRLs short.  Makes sense.

(It's not a particularly good reason, but at least
it's a fair reason.  Revocation is probably costly.)


I think it is considered good practice to carry a cert on
a CRL for some small time after it expires, but not continually
thereafter.


It makes some sort of sense, from an over-cautious
approach.  So, one way to know is to check all the
certs that stay in the list from year to year.  Those
might be revocations.


iang _______________________________________________ mozilla-crypto mailing list [EMAIL PROTECTED] http://mail.mozilla.org/listinfo/mozilla-crypto

Reply via email to