A self-signed CA certificate (technically, a "trust anchor") cannot be
revoked via CRL.  This is assumed to be a function of the higher-layer
security infrastructure which led to the trust anchor being trusted in
the first place, and is outside the scope of CRL.

-Kyle H

On Mon, Jan 26, 2009 at 9:17 PM, PS <mytechl...@gmail.com> wrote:
> Hi All,
> Is it possible to revoke a self-signed CA certificate?
>
> If yes, then I dont understand why it should be allowed. It does not make
> sense. The only reason a root CA would want to revoke its own certificate is
> if its private-key might have been compromised. So, the CA would want to
> revoke its certificate and create a new CRL.
> But since the private-key is compromised, the attacker can always use the
> private-key (of the CA), and create a yet new CRL and distribute.
>
> This looks like a chicken and egg problem because you are trusting a
> CRL-list sent by a CA  and the CRL mentions not to trust the very same CA
> since its  certificate is revoked. What is the solution to this problem? Any
> insights?
>
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to