Google’s Chrome browser will stop relying on a decades-old method for ensuring secure sockets layer certificates are valid after one of the company’s top engineers compared it to seat belts that break when they are needed most.
The browser will stop querying CRL, or certificate revocation lists, and databases that rely on OCSP, or online certificate status protocol, Google researcher Adam Langley said in a blog post published on Sunday. He said the services, which browsers are supposed to query before trusting a credential for an SSL-protected address, don’t make end users safer because Chrome and most other browsers establish the connection even when the services aren’t able to ensure a certificate hasn’t been tampered with.
A consortium of certificate authorities (CAs) and software vendors has released the first industry standard for the issuance and management of SSL certificates.
(via Pascal M.)
“Des chercheurs ont découvert récemment une faille critique dans pratiquement tous les sites Web utilisant le protocole de sécurité SSL (Secure Sockets Layer) comme PayPal et Gmail.”