Re: OCSP Tracking

2011-09-10 Thread Florian Weimer
* Devdatta Akhawe: I was surprised to note that DigiNotar had a log of all IPs who had requested an OCSP lookup for the bad certs. This seems like a very bad idea on the OCSP server's part. Verisign/Symantec keep logs as well, they even issue a yearly press release about them, usually in

Re: OCSP Tracking

2011-09-08 Thread Daniel Veditz
On 9/6/11 11:07 AM, Devdatta Akhawe wrote: Sure. But I think users would be very surprised to find that every time they visit a SSL site, some server somewhere is noting down what site they visited, and when. Yes, OCSP supposedly traded off a little privacy for immediacy over CRLs. Except that

Re: OCSP Tracking

2011-09-06 Thread Jean-Marc Desperrier
On 06/09/2011 11:48, Devdatta Akhawe wrote: [...] if I visit https://www.secure.com in private browsing mode; Firefox makes a OCSP request. After closing private browsing mode and going back to the normal mode, if I go to https://www.secure.com then Firefox caches the OCSP responses and doesn't

Re: OCSP Tracking

2011-09-06 Thread Gervase Markham
On 06/09/11 03:48, Devdatta Akhawe wrote: I was surprised to note that DigiNotar had a log of all IPs who had requested an OCSP lookup for the bad certs. This seems like a very bad idea on the OCSP server's part. Well, the list of IPs has been passed to Google, who are now able to warn people

Re: OCSP Tracking

2011-09-06 Thread Devdatta Akhawe
Well, the list of IPs has been passed to Google, who are now able to warn people accessing Google from those IPs that there is a problem. So there are both good and bad sides to it. Sure. But I think users would be very surprised to find that every time they visit a SSL site, some server

Re: OCSP Tracking

2011-09-06 Thread Ian G
Related but not exactly on point: == The rogue certificate found by Google was issued by the DigiNotar Public CA 2025. The serial number of the certificate was, however, not found in the CA system‟s records. This leads to the conclusion that it is unknown how many certificates were

Re: OCSP Tracking

2011-09-06 Thread Devdatta Akhawe
Hmm. That hints that the logging wasn't turned on by default, but I would prefer a confirmation from the CAs and a definitive policy from Mozilla. Or considering the momentum on the Do-Not-Track proposal, have a CA policy that says Do not log if the OCSP request has a DNT:1 ? thanks devdatta