
Sign up to save your podcasts
Or


A recently identified and widespread configuration error has created a situation where, with the wrong attack on certain public roots, certificates could become essentially unrevokable. As a consequence, 14 public CAs will have to revoke their OCSP certificates, many of which are also intermediates, and permanently discontinue use of their keys. That leaves millions of active TLS, S/MIME, code signing, and document signing certificates in need of immediate replacement or they will be distrusted. Join our hosts as they explain what the problem is and what messy cleanup will be required to address these problems.
By Tim Callan and Jason Soroko5
1515 ratings
A recently identified and widespread configuration error has created a situation where, with the wrong attack on certain public roots, certificates could become essentially unrevokable. As a consequence, 14 public CAs will have to revoke their OCSP certificates, many of which are also intermediates, and permanently discontinue use of their keys. That leaves millions of active TLS, S/MIME, code signing, and document signing certificates in need of immediate replacement or they will be distrusted. Join our hosts as they explain what the problem is and what messy cleanup will be required to address these problems.

30,609 Listeners

187 Listeners

2,011 Listeners

1,649 Listeners

372 Listeners

371 Listeners

651 Listeners

1,028 Listeners

8,077 Listeners

315 Listeners

195 Listeners

8,043 Listeners

6,097 Listeners

10,254 Listeners

45 Listeners