All,

We have a code signing facility that has signed a lot of code using
a certificate that recently expired.  Now, validation of the signed
code fails because one of the certs in the chain has expired (not
the root cert, and not the signing cert).

So, should the verification routine be changed to recognize that
the code was signed *before* the cert expired, thereby considering
the signature "valid"?  Or should we re-sign the thousands of objects
using a new cert?  It will be a pain to re-sign each time a cert in the
chain expires.  Are there any official standards that say what it means
when a cert in a validation chain is expired?  What are the security
issues in trying to ascertain the date that an object was signed so that
we can compare the "signed-on" date against the validity dates of
the certs in the chain (vs. using the current time of the system)??
What other solutions are there?

cj
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to