On Tue, Apr 22, 2008 at 12:59 AM, Lutz Jaenicke <[EMAIL PROTECTED]> wrote:
>  Ok, so we are facing a violation of policies at the CA. At the date of
>  certificate verification we are however checking whether all components
>  of the certificate chain are valid at this day.
>  Even though the overlapping dates are a violation of the standard the
>  question is whether we actually should actually enforce this inside the
>  library. It might lead to a communication failure with site a lot of
>  "poor souls" set up without taking care of this fact...

We've had this argument over on Mozilla's NSS group.  The 'root
certificate' is generally held, by Mozilla products, to be simply a
convenient container for holding the trust anchor, which is the public
key.  I've taken the argument that the holder of the private key
should be able to specify how long it wants that public key to be
trusted, after which it won't guarantee that it will hold the private
key any longer -- i.e., the 'expiration date' of the root certificate
should be a statement of policy about the root.  Unfortunately, my
argument was ignored.

There's "what the standard says" and "what real-world implementations
of the standard do".  Unfortunately, the real-world implementations
don't follow the rules.

Is there any way to get a PEDANTIC_CERTIFICATE_RULES option?

-Kyle H
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to