Podcast
Root Causes 378: Why Are Forced Revocations So Difficult?


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
April 15, 2024
In the latest in our ongoing series of discussions of the Bugzilla Bloodbath, we delve deep into the problem of failure to revoke on time and the multiple causes that lead to this ongoing failure. And what to do about them.
Podcast Transcript
Lightly edited for flow and brevity.
Both of them. Let’s say we say that the subscriber can't replace the certificate within that time period. Okay. That's really, really, really bad. Because if it is a Heartbleed kind of situation, or a compromised private key kind of situation, you're just plain exposed. Your security is zero. And if you're incapable of making your security not be zero under those circumstances, then you're just not secure. Pure and simple. Lousy answer. Awful answer.
Now, let's suppose on the other hand, that the subscriber can get it done within the time period, but they just don't want to. It's inconvenient. I want to do something else. It's expensive. It makes me grouchy. I have to tell my boss.
I think if the world puts in place three things, and I think you know what those are, then we will be no longer in this situation where we've got to jump on a podcast and get as fired up about this because it will be become much more of a non-issue because the pain of mass revocation will mostly go away, Tim.
Go with an extreme thought experiment with me, Jay. Let's pretend that all public TLS certificates were no more than 10 days in duration, and I had a five day revocation event. That means that 50% of my certs are going to expire before the revocation time comes. I don't even need to do those.
So a CA that bites the bullet and says, I'm really sorry. I know this is gonna be unpleasant, but we all have to get here eventually is doing the public good. More good. It’s doing the web PKI more good than a CA that enables the continued lack of agility, lack of certificate agility in its subscribers.

