Am 21.01.2014 11:21, schrieb Kamalraj Madhurakasan:
Hello Ted,
In our application we have requirement to introduce new option which
allows customers to renew their certificates which was installed in it
already.
We would like to find out whether the new certificate is really a
renewal certificate of old one so that we can allow them to replace
the old one with new one.
So to find out the match we decided to use fields (Issuer Or subject)
And Serial number. But when I used openssl to create renew certificate
as in the steps I mentioned already I see that the subject can be
altered and serial number is different.
From your mail I understand that other than public key, any field can
be different or same based on the CA that customer uses. We have many
customers across globe and they get their certificates signed and
renewed by many CA in market.
So my conclusion, is its up to us to decide now on choosing match
fields. Let me know if I am missing something.
Now, I don't know the details of your software, but I'd advise to use
the subject fields (maybe only some of them) to identify the customer.
Though there's no guarantee, my guess is that in most renewed
certificates the subject won't change... Also you'll catch those
customers who'll want to use new keys. Same issuer makes some sense,
because usually another CA will have more or less subtle differences in
the subject fields.
Of course you'll never get 100% of all "renewed" certificates, but a
good percentage should be possible.
I'd not restrict identification to the same public key, because that's
only a technical detail, but has no "intrinsic" connection to the person
who uses it. The serial number is definitively useless for your purpose.
All this has not much to do with openssl, so maybe we should move to
private discussion if you still have questions. And maybe I should think
about consulting charges... :-)
Hope this helps,
Ted
Thanks
Kamalraj
On Tue, Jan 21, 2014 at 1:30 PM, Bernhard Fröhlich <t...@convey.de
<mailto:t...@convey.de>> wrote:
Ho there,
from the technical perspective (which is the thing this list is
concerned with) a "renewed" certificate is a new certificate for
the same keys as the old one. No step of the three you list as
necessary is necessary from the openssl point of view, but may be
required by your CA.
The data contained in the "renewed" certificate, beside the public
part of the key, is completely up to the issuing CA and usually
laid down in their policies.
So, you should address your questions to the CA you want to get
your certificates from. If you are implementing your own CA, you
have to decide what you want to do.
Or was your question about best practices when creating a CA policy?
Hope this helps at least a bit,
Ted
;)
Am 21.01.2014 06:51, schrieb Kamalraj Madhurakasan:
Hello guys,
I would like to know whether my understanding about
certificate renewal is correct or not.
To renew the certificate:
1. we need to generate a new CSR from the private key
2. revoke the old certificate
3. get the new CSR signed by the CA with validity extended
The fields that are common between old and new renewed
certificate will be:
1. SKI
2. AKI
3. Issuer
4. Public Key
The fields are not be common are:
1. subject (I see that while generating new CSR we can change
the subject)
2. Serial number
3. Other fields
Please share your inputs on this.
Thanks
Kamalraj
--
PGP Public Key Information
Download complete Key from http://www.convey.de/ted/tedkey_convey.asc
Key fingerprint = 31B0 E029 BCF9 6605 DAC1 B2E1 0CC8 70F4 7AFB 8D26
______________________________________________________________________
OpenSSL Project http://www.openssl.org
User Support Mailing List openssl-users@openssl.org
<mailto:openssl-users@openssl.org>
Automated List Manager majord...@openssl.org
<mailto:majord...@openssl.org>
--
PGP Public Key Information
Download complete Key from http://www.convey.de/ted/tedkey_convey.asc
Key fingerprint = 31B0 E029 BCF9 6605 DAC1 B2E1 0CC8 70F4 7AFB 8D26