[15215] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Verisign CRL single point of failure

daemon@ATHENA.MIT.EDU (t.c.jones@att.net)
Wed Mar 31 23:12:42 2004

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
From: t.c.jones@att.net
To: Rich Salz <rsalz@datapower.com>
Cc: "R. A. Hettinga" <rah@shipwright.com>, cryptography@metzdowd.com
Date: Sat, 10 Jan 2004 03:19:05 +0000

Verisign incorrectly built the new certificate causing every SSL access on IE 5.x to request a 
new CRL (700k) on every single SSL access.  This has been fixed, a new udated cert is 
available and the CRL storm is abating.  See the versign site for more details on what they did to 
fix the problem, but nothing of course on what they did wrong.

Note that two separte certs expired at the same time so there were two competing DOS attacks 
simultaneously.
hth  ..tom
> Can someone explain to me why the expiring of a certificate causes new 
> massive CRL queries?
> 	/r$
> 
> -- 
> Rich Salz, Chief Security Architect
> DataPower Technology                           http://www.datapower.com
> XS40 XML Security Gateway   http://www.datapower.com/products/xs40.html
> XML Security Overview  http://www.datapower.com/xmldev/xmlsecurity.html
> 
> ---------------------------------------------------------------------
> The Cryptography Mailing List
> Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post