IETF-SSH archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: OpenSSH certified keys



On Tue, 16 Mar 2010, denis bider \(Bitvise\) wrote:

> I second Nicolas's concern. Your spec doesn't even mention revocation. 
> How is revocation handled? Are the keys expected to be certified only 
> for a very short term?
> 
> If certification is expected to be for only a very short term, are you 
> putting an infrastructure in place that allows a client to obtain a 
> fresh certificate before it connects?
> 
> If you are putting such infrastructure in place, do you have a spec for 
> how the client obtains the fresh certificate?
> 
> Otherwise, if you are planning for these certificates to be long-term, 
> what is your solution for revocation?

For OpenSSH, revocation is implemented as a simple list of banned keys.
Since keys are the entity that is revoked and not certificates, and 
because there are no wire-side changes require for revocation, I don't
really see it as part of this certificate specification.

-d



Home | Main Index | Thread Index | Old Index