HOW to set “security.OCSP.require” in Google Chrome/Chromium?

Patrick O'Callaghan pocallaghan at gmail.com
Thu Mar 24 19:42:56 UTC 2011


On Thu, 2011-03-24 at 14:10 -0500, Bruno Wolff III wrote:
> On Thu, Mar 24, 2011 at 14:16:49 -0430,
>   Patrick O'Callaghan <pocallaghan at gmail.com> wrote:
> > 
> > Wierd advice IMHO. There are a number of practical reasons for not
> > checking CRLs (Certificate Revocation Lists) all the time, but sending
> > cert serial numbers to the CA is not among them. The serial number is
> > not secret information (neither is the cert itself of course). If you
> > don't trust the CA, then better disable certs entirely, not just CRL
> > checking.
> 
> Sending the serial number to the CA allows the CA to guess (with high
> probability of being correct) that you are visiting the web page that
> they sold the certificate for. This information can be resold to other
> companies for marketing purposes (or other reasons). If there is any
> money in this, I wouldn't expect Verisign to pass the opportunity up based
> on other similar stuff they have done.

Even if that's true, it doesn't belie what I just said. If you don't
trust the CA, don't use their services at all.

There does not exist, and never can exist, a means of securing
communication between two parties that don't trust each other unless
they both decide to place some level of trust in a third party. CAs are
just one way to do that (and clearly they need to get their act
together). Web-of-trust mechanisms are another but I don't know of any
mainstream browsers that support them.

poc



More information about the users mailing list