Hi,

thank you all for the clarification. As most users do not have OpenSSL
1.0.2, this doesn't seem to solve my problem.

What I want to achieve is having a new rootCA, which replaces an
oldRootCA, which I am using until now.

So far the trust chain is: oldRoot -> oldServerCert.

What I thought should be possible is building this trust chain:
oldRoot -> newRoot -> newSubCA -> newServerCert

As Users are trusting oldRoot, changing the oldServerCert to
newServerCert is no problem. After some time, users would move trust to
newRoot and I can "disable" oldRoot.

This doesn't seem possible, if I understand your answers correct.

Is there another/better/default way of smoothly changing a trust anchor?
I.e. by cross-signing the newRoot by itself and the oldRoot?

Thanks, Sven.

-- 
PGP Key: https://0x80.io/pub/files/key.asc
PGP Key Fingerprint: 2DF2 79CD 48DD 4D38 F0B6  7557 2E68 D557 49AA 1D99

Note: I'll be transitioning away from this key in the near future.

On 05/27/2014 05:16 PM, Dr. Stephen Henson wrote:
> On Tue, May 27, 2014, Viktor Dukhovni wrote:
> 
>> On Tue, May 27, 2014 at 03:44:46PM +0200, Sven Reissmann wrote:
>>
>>> But, should't it also be possible to only verify the trust chain up to
>>> the subCA (i.e., if I fully trust this CA)? I would have expected that
>>> this will verify sucessfully:
>>
>> OpenSSL versions prior to 1.0.2 require that all trusted certificates
>> be self-signed.  In 1.0.2 it is possible to use X509_verify_cert()
>> with a trust anchor that is not self-signed, but I don't recall
>> whether this is possible through the CLI.
>>
> 
> It is with the -parial_chain option.
> 
> Steve.
> --
> Dr Stephen N. Henson. OpenSSL project core developer.
> Commercial tech support now available see: http://www.openssl.org
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           majord...@openssl.org
> 

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to