Hello all,
I have a question that comes from a real-life situation.
Suppose you have a CA that signed a CSR and prodused a certificate for
some user.
After sometime the CA revokes that certificate. Then that user sends to
a CA a new CSR.
The policy of the CA does not permit it to sign a CSR generated using a
key which has been revoked (well, the corresponding certificate has been
revoked). How can the CA verify that the new  CSR hasn't been signed
with the old (revoked) key. Is there an elegant method? One option is to
get out a public key both from CSR and from (possibly all!) revoked
certificates and compare them. If there is a match then CA rejects a CSR
as doesn't matching its policy. But this method is too cumbersome. Is
there some option to a verification command (say openssl req -verify
...) to verify a CSR which allows to pass a directories or files that
contain a list of untrusted certificates?

Best regards,
Arsen.

-- 
PGP Key: ID 0xBBE3DFD8 (expires: 2006-08-03)
Fingerprint: 1C3B 2C01 40DF ED87 23B1  BF6F 95C4 2E77 BBE3 DFD8

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

Reply via email to