Why a PKI is barely trustworthy
- End-point trusts *any* certificate from *any* CA configured
- fake certificates issues by another CA are a common thread
- measure "certificate pinning" only standardized for HTTP (HPKP, is now deprecated)
- Centralized system
- high demand for confidentiality of CA private keys
- measure "intermediate certificates" makes system even more complex and more systems demanding high confidentiality
- Key Revocation cumbersome
- based on centralized "black list"
- Certificate Revocation Lists (CRLs) growing *huge* quickly and need to be distributed to each end-point
- OCSP (Online Certificate Status Protocol) requires online connection and additional services to be available 24/7
- OSCP is a thread to privacy
- Key renewal does not revoke old key
- if the old key is still valid (with in its life-time) and not on the CRL, it can still be used
- Complex to plan, deploy and run
- No opportunistic use
- Can either be enforced or not used at all.
- Has no notion of "I stared communication encrypted, so I no longer accept unencrypted messages"
- No TOFU (beside now-deprecated HPKP)