Thoughts about security, privacy, ...

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Walter H. wrote:
> On 30.10.2015 21:42, Michael Str?der wrote:
>> Walter H. wrote:
>>> On Thu, October 29, 2015 11:07, Jakob Bohm wrote:
>>>> She (Eve) would know that the requesting party Alice
>>>> was talking to Bob at the very moment she sent Trent
>>>> the OCSP *request* for Bob's certificate.
>>>>
>>>> [...] equivalent of having (almost complete) real time
>>>> copies of everybody's phone bill/call records.
>>>> Who was calling who at what time.
>>> this is not a problem as long as the public keys (the certificates) are
>>> not really public;
>>> because in your example Eve doesn't have the knowledge which certificate
>>> the specific serial number has ...
>>>
>>> if the public keys (the certificates) are searchable by public - the worst
>>> case direct by a search engine like google - then you would get an
>>> absolute security whole:
>> Update for you: https://crt.sh/
>>
> you know the difference between SSL and S/MIME?

I know the difference very well - probably even longer than you.

Note:
1. Google's certificate transparency project is not limited to certain
certificate types.
2. Privacy concerns are raised because of browsers validating server certs via
OCSP during TLS connect.

=> OCSP should be feasible over TLS in the spirit of RFC 7258.

Ciao, Michael.


-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 4245 bytes
Desc: S/MIME Cryptographic Signature
URL: <http://mta.openssl.org/pipermail/openssl-users/attachments/20151031/9f16361f/attachment.bin>


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux