* Lutz Jaenicke wrote on Tue, Apr 22, 2008 at 09:59 +0200:
> > This rule is independent of current time. e.g. If the validity dates
> > of the parent certificate is 2008/04/18~2009/04/18 and the ones of
> > child certificate is 2008/06/18~2009/06/18 or 2008/03/18~2009/03/18,
> > the certificate chain should be invalid. The validity dates of child
> > certificate should be between  the ones of parent(2008/04/18~2009/04/18).
> Ok, so we are facing a violation of policies at the CA. At the date of
> certificate verification we are however checking whether all components
> of the certificate chain are valid at this day.

> Even though the overlapping dates are a violation of the standard the
> question is whether we actually should actually enforce this inside the
> library.

Yes, maybe then a new CA certificate will be presented (with new
expiry dates), why not.

BTW, what is the idea/logic behind?
  I don't understand why this should be independent of current
  time. Maybe before the CA certificate expires, a new CA
  certificate will be presented without overlapping validity.
  Also, if the child certificate would be trusted if valid till
  2009/04/18 on 2009/04/17, I don't see why it should not be
  trusted at the same day (2009/04/17) if valid till 2009/04/19.
  I understand that in the second case the CA certificate is not
  trusted anymore, but this surely does depend on current time.

I've already read the idea that a CA should not certify for
longer than a certificate that is valid for the signing key - but
never understood why. Is this some standard requiring that or is
it just a matter of policy (and style maybe)? 

Where can I read/learn more?

Beside useless and expensive, wouldn't it be allowed (correct) if
the CA every day creates a new one-day-valid CA certificate?

Can it really be concluded from the expiry date of some
certificate whether the CA is authorised to certify or not? What
if the CA is authorised to certify for four years with a maximum
certificate duration of 30 days? (or whatever some policy
requires).

If it is just against the policy of some CAs and other reaonable
policies could be imagined, I think it should not be checked by
the library.

oki,

Steffen
 
About Ingenico Throughout the world businesses rely on Ingenico for secure and 
expedient electronic transaction acceptance. Ingenico products leverage proven 
technology, established standards and unparalleled ergonomics to provide 
optimal reliability, versatility and usability. This comprehensive range of 
products is complemented by a global array of services and partnerships, 
enabling businesses in a number of vertical sectors to accept transactions 
anywhere their business takes them.
www.ingenico.com This message may contain confidential and/or privileged 
information. If you are not the addressee or authorized to receive this for the 
addressee, you must not use, copy, disclose or take any action based on this 
message or any information herein. If you have received this message in error, 
please advise the sender immediately by reply e-mail and delete this message. 
Thank you for your cooperation.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to