From: Simon Spero <ses@tipper.oit.unc.edu>
To: cypherpunks@toad.com
Message Hash: 11db289f0ac8f843165f39255f231c669bff3c15d2ca8e593df5dcf5be31869d
Message ID: <Pine.SOL.3.91.950924182101.12733D-100000@chivalry>
Reply To: <199509242121.RAA08234@frankenstein.piermont.com>
UTC Datetime: 1995-09-25 01:25:28 UTC
Raw Date: Sun, 24 Sep 95 18:25:28 PDT
From: Simon Spero <ses@tipper.oit.unc.edu>
Date: Sun, 24 Sep 95 18:25:28 PDT
To: cypherpunks@toad.com
Subject: Important consequence of existence of compromised Netscape certificates
In-Reply-To: <199509242121.RAA08234@frankenstein.piermont.com>
Message-ID: <Pine.SOL.3.91.950924182101.12733D-100000@chivalry>
MIME-Version: 1.0
Content-Type: text/plain
There's one very important side-effect of the existence of a large number
of compromised certificates accepted by navigator: the upgraded clients
must either do CRL processing, or the roots used to sign all possibly
compromised keys *must* be rejected by the fixed navigator.
Simon
Return to September 1995
Return to “Simon Spero <ses@tipper.oit.unc.edu>”