Hi all,

I have a small question about the I-D. In particular, it seems to me that this proposal circumvents any limitation on the effective lifetime of a short-lived-cert's keypair. From a cryptographic standpoint of view, it is good practice to impose strict lifetimes on keys (i.e., usually via validity periods in certificates) to limit the issue of successful attacks on the crypto scheme (e.g., key factorization). This proposal would de-facto remove this property by adopting re-issuing instead of re-keying when renewing a certificate.

Although the CA might be able to track the usage of a key from the initial CSRs, the automatic issuance of the certificate itself without the constraints of the key longevity seems quite dangerous and possibly open to a policy of "set-and-forget" that might last for... years... (automatically not re-issuing the certificate based on key-size + CSR timestamp would, I think, create issues for CDNs as there would be no indication when a new LURK/CSR cycle is needed).

Am I reading it wrong / missing something ?

Cheers,
Max

--
Massimiliano Pala, PhD
Director at OpenCA Labs
twitter: @openca

_______________________________________________
Acme mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/acme

Reply via email to