Mark H. Wood wrote:

> Further, it won't be a trust root until it's distributed and the
> recipients are satisfied that it is legitimate.  And I think that's
> the real question:
>
>   When my CA's certificate expires, can I update it without having to
>   deliver copies securely to everyone who is supposed to trust my CA?
>
> The answer to *that* question had better be "NO".  It truly doesn't
> matter whether you made a new certificate or updated the old one,
> because in either case you must distribute it again in a trustworthy
> manner or nobody will trust it.

There should be a way to issue an updated root certificate signed by the
original root (while it is still valid) such that browsers provide a very
simple prompt that strongly encourages you to "update" the certificate. If a
root is compromised inside its validity period, you're screwed anyway.
Unfortunately, as far as I know, there is no such thing.

DS


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to