Cryptography
Cryptography
Practical Issues:
• Latency and Privacy Concerns: OCSP checks can introduce latency and may expose user
browsing habits to CAs.
• Availability: If OCSP responders are unavailable, browsers often default to a "soft-fail,"
accepting the certificate without confirmation of its validity.
• Ineffectiveness: Due to these issues, certificate revocation mechanisms often fail to prevent
the use of compromised certificates in practice.
Implications:
• Attackers with access to a compromised certificate and its private key can perform man-in-
the-middle attacks, as browsers may not effectively check revocation status.
Getting a Root CA Accepted in
Systems and Browsers.
Certification Requirements:
• CAs must be audited and certified by recognized authorities like WebTrust.
• They must demonstrate secure key management, proper validation
processes, and adherence to strict operational policies.
Browser and OS Trust Stores:
• Operating Systems: Maintain their own list of trusted root CAs.
• Browsers: Some, like Firefox, maintain their own trust stores, while others
rely on the OS's trust store.
Inclusion Process:
• CAs must apply to each browser and OS vendor separately, providing
evidence of compliance with their specific requirements.
• The process is rigorous to ensure that only trustworthy CAs are included,
maintaining the integrity of the PKI system.