Re: [openssl-users] Should I / How to remove expired certificates from CRL

2017-02-09 Thread Wouter Verhelst
On 09-02-17 10:58, PM Extra wrote: Should I remove expired certificates from CRL? No. The date of the revocation, which can be found in the CRL, is still relevant for checking when older certificates were revoked, in case you ever need to check signatures on older messages. -- Wouter

Re: [openssl-users] Should I / How to remove expired certificates from CRL

2017-02-09 Thread Michael Wojcik
If you remove expired certificates from the CRL, then CRL consumers have no way of knowing whether a certificate was revoked before it expired, and thus no way of knowing whether a timestamped signature made with the corresponding key is valid. This is a complex issue, because CRL bloat is a

Re: [openssl-users] Should I / How to remove expired certificates from CRL

2017-02-09 Thread Jakob Bohm
On 09/02/2017 10:58, PM Extra wrote: Should I remove expired certificates from CRL? If so, how to do this? Depends if any relying parties are checking old signatures "as of" some securely recorded date of receiving the signature. In that case, they will still need to be able to s

[openssl-users] Should I / How to remove expired certificates from CRL

2017-02-09 Thread PM Extra
Should I remove expired certificates from CRL?? If so, how to do this?-- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

Re: [openssl-users] Building OpenSSL: OpenSSL-Release, expired certificates

2016-02-29 Thread Rob Hermann
I'm running in a linux-elf environment as the su. when I run "make tests" at the tail end of the tests I get some errors about expired certificates: testing pkcs7 conversions p -> d p -> p d -> d p -> d d -> p p -> p testing pkcs7 conversions (2) p ->

RE: handling of expired certificates

2013-04-24 Thread Eisenacher, Patrick
> From: Salz, Rich > > OpenSSL does nothing about this.  It’s an interesting question.  As for as > TLS/SSL is concerned, > it is only using the certificate at the time the connection is initially > established, and therefore > expiration (or revocation) during the application’s use of the certif

Re: [openssl-users] handling of expired certificates

2013-04-24 Thread Erwann Abalea
4/2013 19:17, Vijaya Venkatachalam a écrit : Hi I am new to openssl application development. I had a question on how to handle expired certificates. So at the time of openssl connection establishment, the certificate is valid. But while the connection is still up, the certificate expires. Is the app

Re: handling of expired certificates

2013-04-24 Thread Viktor Dukhovni
On Tue, Apr 23, 2013 at 10:17:54AM -0700, Vijaya Venkatachalam wrote: > So at the time of openssl connection establishment, the certificate is valid. > But while the connection is still up, the certificate expires. The certificate was valid at the time it was verified, this is sufficient. > Is t

RE: handling of expired certificates

2013-04-24 Thread Salz, Rich
OpenSSL does nothing about this. It's an interesting question. As for as TLS/SSL is concerned, it is only using the certificate at the time the connection is initially established, and therefore expiration (or revocation) during the application's use of the certificate is up to the application

handling of expired certificates

2013-04-24 Thread Vijaya Venkatachalam
Hi   I am new to openssl application development. I had a question on how to handle expired certificates.   So at the time of openssl connection establishment, the certificate is valid. But while the connection is still up, the certificate expires.   Is the application supposed to handle this or

Re: [openssl-users] Re: certificate validation issues with openssl 1.0.0 and expired certificates in cafile

2012-09-26 Thread Erwann Abalea
Le 25/09/2012 18:45, Jakob Bohm a écrit : On 9/25/2012 6:12 PM, Erwann Abalea wrote: Le 25/09/2012 14:16, Jakob Bohm a écrit : > On 9/25/2012 11:11 AM, Erwann Abalea wrote: [...] Any signature algorithm works by dividing the universe of N bit strings into those that are validsignatures for the

Re: [openssl-users] Re: certificate validation issues with openssl 1.0.0 and expired certificates in cafile

2012-09-25 Thread Jakob Bohm
On 9/25/2012 6:12 PM, Erwann Abalea wrote: Bonjour, Le 25/09/2012 14:16, Jakob Bohm a écrit : > On 9/25/2012 11:11 AM, Erwann Abalea wrote: >> Le 24/09/2012 21:03, Jakob Bohm a écrit : >> > Does that work with any other serious X.509 validation toolkit? >> >> It should. And in fact, OpenSSL wor

Re: [openssl-users] Re: certificate validation issues with openssl 1.0.0 and expired certificates in cafile

2012-09-25 Thread Erwann Abalea
Bonjour, Le 25/09/2012 14:16, Jakob Bohm a écrit : On 9/25/2012 11:11 AM, Erwann Abalea wrote: Le 24/09/2012 21:03, Jakob Bohm a écrit : > Does that work with any other serious X.509 validation toolkit? It should. And in fact, OpenSSL works correctly, at least versions 1.0.1 (Ubuntu), and 1

Re: [openssl-users] Re: certificate validation issues with openssl 1.0.0 and expired certificates in cafile

2012-09-25 Thread Jakob Bohm
On 9/25/2012 11:11 AM, Erwann Abalea wrote: Bonjour, Le 24/09/2012 21:03, Jakob Bohm a écrit : > Does that work with any other serious X.509 validation toolkit? It should. When trying to build a valid certification path, all possibilities have to be tested until one of them succeeds. If a CA gi

Re: certificate validation issues with openssl 1.0.0 and expired certificates in cafile

2012-09-25 Thread Klaus Darilion
, Erik Tkal wrote: I suppose that’s a workaround, but doesn’t address the root cause. Windows can quite happily handle expired certificates still hanging out in trusted stores; I see this all the time as root updates occur and renewed certificates are installed. It seems that a change in OpenSSL broke

Re: [openssl-users] Re: certificate validation issues with openssl 1.0.0 and expired certificates in cafile

2012-09-25 Thread Erwann Abalea
Bonjour, Le 24/09/2012 21:03, Jakob Bohm a écrit : Does that work with any other serious X.509 validation toolkit? It should. When trying to build a valid certification path, all possibilities have to be tested until one of them succeeds. If a CA gives a good signature, but fails for whateve

Re: certificate validation issues with openssl 1.0.0 and expired certificates in cafile

2012-09-24 Thread Ashok C
Thanks Jacob, but in the three scenarios you mentioned, the first one *does not* seem to be supported by openssl 1.0.0*. I think that was the subject of this email thread in the beginning. >>1. Changing expiry or other attributes while keeping the key. Here the CA issues a new self-signed certific

Re: certificate validation issues with openssl 1.0.0 and expired certificates in cafile

2012-09-24 Thread Jakob Bohm
Does that work with any other serious X.509 validation toolkit? To make this work (assuming the old root CA cert has not yet expired), the validation code will need to actually verify the End Entity certificate against both public keys, which effectively reduces the algorithm security by allowi

Re: certificate validation issues with openssl 1.0.0 and expired certificates in cafile

2012-09-24 Thread Ashok C
Only the private and public keys are different.. Rest of the fields are same.. Basically I am simulating the trust anchor update related scenarios.. And yes Jacob, thanks for indicating, I'll make sure I don't use such abbreviations from here on.. Ashok On Sep 24, 2012 11:25 PM, "Jakob Bohm" wrot

Re: certificate validation issues with openssl 1.0.0 and expired certificates in cafile

2012-09-24 Thread Jakob Bohm
Hi, In your test case which fields actually differ between the old root CA certificate and the new root CA certificate? P.S. Please do not use those 3 letter abbreviations of certificate field names, very few people know those abbreviations. For the benefit of other readers: I think Ashok was

Re: certificate validation issues with openssl 1.0.0 and expired certificates in cafile

2012-09-24 Thread Ashok C
Hi, One more observation was made here in another test case. *Configuration:* One old root CA certificate oldca.pem with subject name say, C=IN One new root CA certificate newca.pem with same subject name. One EE certificate, ee.pem issued by new root CA. *Test case 1:* Using CAFile option in ope

Re: certificate validation issues with openssl 1.0.0 and expired certificates in cafile

2012-09-24 Thread Jakob Bohm
On 9/13/2012 3:41 PM, Charles Mills wrote: Would it make sense to delete the expired certificate from the Windows store? Duplicate expired/non expired CA certificates sounds to me like a problem waiting to happen. /Charles/ Windows has built in support for using and checking time stamping c

Re: certificate validation issues with openssl 1.0.0 and expired certificates in cafile

2012-09-19 Thread Ashok C
I had tested this with my > own SSL client and observed the same behaviour. > > -- > Ashok > > On Thu, Sep 13, 2012 at 8:39 PM, Erik Tkal wrote: > >> I suppose that’s a workaround, but doesn’t address the root cause. >> Windows can quite happily handle expired cer

Re: certificate validation issues with openssl 1.0.0 and expired certificates in cafile

2012-09-14 Thread Ashok C
that’s a workaround, but doesn’t address the root cause. > Windows can quite happily handle expired certificates still hanging out in > trusted stores; I see this all the time as root updates occur and renewed > certificates are installed. It seems that a change in OpenSSL broke the > pr

RE: certificate validation issues with openssl 1.0.0 and expired certificates in cafile

2012-09-13 Thread Erik Tkal
I suppose that's a workaround, but doesn't address the root cause. Windows can quite happily handle expired certificates still hanging out in trusted stores; I see this all the time as root updates occur and renewed certificates are installed. It seems that a change in OpenSSL

RE: certificate validation issues with openssl 1.0.0 and expired certificates in cafile

2012-09-13 Thread Charles Mills
, September 13, 2012 12:49 AM To: openssl-users@openssl.org Subject: Re: certificate validation issues with openssl 1.0.0 and expired certificates in cafile Sending again as the previous email did not appear in list. Is there some problem with the mailing list? -- Ashok On Wed, Sep 12, 2012 at

Re: certificate validation issues with openssl 1.0.0 and expired certificates in cafile

2012-09-13 Thread Ashok C
Sending again as the previous email did not appear in list. Is there some problem with the mailing list? -- Ashok On Wed, Sep 12, 2012 at 2:59 PM, Ashok C wrote: > Hi, > > I don't think this question was answered. Could you please reply? > > -- > Ashok > > > On Tue, Jul 31, 2012 at 11:13 PM, Kl

Re: certificate validation issues with openssl 1.0.0 and expired certificates in cafile

2012-09-12 Thread Ashok C
Hi, I don't think this question was answered. Could you please reply? -- Ashok On Tue, Jul 31, 2012 at 11:13 PM, Klaus Darilion < klaus.mailingli...@pernau.at> wrote: > Hi! > > I wrote a small program which dumps all root certificates from Windows > certificate store into a file. Then I use ope

certificate validation issues with openssl 1.0.0 and expired certificates in cafile

2012-07-31 Thread Klaus Darilion
Hi! I wrote a small program which dumps all root certificates from Windows certificate store into a file. Then I use openssl to connect to Google and validate its certificate: openssl s_client -connect www.google.com:443 -CAfile dump.crt When using openssl0.9.8k or openssl0.9.8x everything w

RE: Expired certificates out from revocation list

2007-12-17 Thread David Schwartz
> How can I get rid of the expired certificates in the revocation > list? When I > do openssl ca -gencrl -out revocationlist.crl -config myconfig.cfg the > revoked certificates that are also expired are added into the > list. It is no > use to store them there because the rev

Re: Expired certificates out from revocation list

2007-12-17 Thread Bernhard Froehlich
unski schrieb: How can I get rid of the expired certificates in the revocation list? When I do openssl ca -gencrl -out revocationlist.crl -config myconfig.cfg the revoked certificates that are also expired are added into the list. It is no use to store them there because the revocation list

Expired certificates out from revocation list

2007-12-17 Thread unski
How can I get rid of the expired certificates in the revocation list? When I do openssl ca -gencrl -out revocationlist.crl -config myconfig.cfg the revoked certificates that are also expired are added into the list. It is no use to store them there because the revocation list grows bigger and

Re: Renewing expired certificates

2006-03-30 Thread michael Dorrian
the revoke command > is when it is really needed. > Do i need to use the revoke command and why?. No. Revoking of expired certificates is only needed if you keep using your index file and the "unique_subject" entry in openssl.cnf is not set to "no".One thing you'll

Re: Renewing expired certificates

2006-03-28 Thread Bernhard Froehlich
tem but i would like to have a client and server pair and have two way authentication but keeping the same CA forever is fine. The only time i would like to use the revoke command is when it is really needed. Do i need to use the revoke command and why?. No. Revoking of expired certificates is onl

Renewing expired certificates

2006-03-28 Thread michael Dorrian
authentication but keeping the same CA forever is fine. The only time i would like to use the revoke command is when it is really needed. Do i need to use the revoke command and why?. Also what is the easiest way for me to renew my expired certificates?. Any answers to both these questions would be greatly

Re: Handling expired certificates

2005-08-31 Thread david kine
I think that I found the answer - get the error code from the X509_STORE_CTX and check for the value X509_V_ERR_CERT_HAS_EXPIRED (defined in x509_vfy.h). -David --- david kine <[EMAIL PROTECTED]> wrote: > My application requires a feature that allows > connection to secure servers whose certifi

Handling expired certificates

2005-08-31 Thread david kine
My application requires a feature that allows connection to secure servers whose certificates may have expired. I suppose that the OpenSSL verify callback function, set with the function SSL_CTX_set_verify(), can inspect an error condition and return "true" to establish the secure connection. My

Problem with expired certificates

2004-05-27 Thread Sean Aitken
Hello all! I've developed a solution that leverages openssl (Through COM) for certificate management. We have our own internal CA and we have issued over 500 X.509 client certificates for accessing sensitive information on our customer support site. It works great! Today, we hit a problem. For

Re: revoking expired certificates

2004-01-29 Thread Mark Foster
On Wed, Jan 28, 2004 at 02:28:47AM -0800, Kathiravan Velusamy wrote: > > Hi, > > The process of renewing a self-signed certificate once it has expired is as follows: [snip] > $patch renew-server-cert.sh < user-patch That should be $patch renew-user-cert.sh < user-patch Sorry for that typo. Inc

Re: revoking expired certificates

2004-01-28 Thread Kathiravan Velusamy
  Hope it is useful for you   Regards, Kathiravan www.visolve.com   - Original Message - From: "Gerd Schering" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Thursday, January 22, 2004 3:34 PM Subject: revoking expired certificates > Hi,> > It is po

Re: revoking expired certificates

2004-01-26 Thread Rich Salz
What if my cert happened to expire 1 month later? Would that mean if someone did compromise my cert and sent signed e-mails before it expired (but *after* I added to the CRL), then after it expires, that signed e-mail would appear VALID - as it wouldn't be in the CRL anymore? No, it will be in the

Re: revoking expired certificates

2004-01-25 Thread Jason Haar
On Thu, Jan 22, 2004 at 10:44:31AM -0500, Rich Salz wrote: > Why? If I signed something last week, and the certificate was valid > last week, isn't the signature still good? There are some people who > feel differently. It probably all depends on legal and regulatory > context. Is the wet si

Re: revoking expired certificates

2004-01-23 Thread Rich Salz
But let me be somewhat more specific. If I use the openssl ca utility, it is technically possible to revoke a cert which has expired for instance for one year. If I generate a CRL (via the ca utility) the cert appears on the CRL. Does this make any sense? The crl tool has to be able to include a

Re: revoking expired certificates

2004-01-23 Thread Gerd Schering
Rich Salz wrote: Gerd Schering wrote: Hi, It is possible (via the ca utility) to revoke certificates that already have expired. Hard to say. The ITU X.509 standard says that if a certificate is revoked, it stays on the CRL for one CRL past its expiration date. In other words, if the order

AW: How to manage expired certificates?

2002-04-19 Thread Dirk Klingenberg
REMOVE

How to manage expired certificates?

2002-04-19 Thread Marco Nardelli
hi all, I would like to pose questions about expired certificates, because I don't know at all what happens to openssl when a certificate expires. I suppose that in "index.txt" "V" is changed to "E" (?) or something like that, and then ? What to do if I wa

How to manage expired certificates?

2002-04-18 Thread Marco Nardelli
hi all, I would like to pose questions about expired certificates, because I don't know at all what happens to openssl when a certificate expires. I suppose that in "index.txt" "V" is changed to "E" (?) or something like that, and then ? What to do if I wa

Re: Expired certificates

2001-07-25 Thread Götz Babin-Ebell
[EMAIL PROTECTED] wrote: Hello Jon, > It appears from my testing that the expiry time on a certificate is taken > from the client's machine time, not the server time. I've tested this with > IE 5.01 SP1 and Netscape 4.77. No the expiry time should be encoded in the certificate. The element for t

Expired certificates

2001-07-25 Thread John . Airey
I've just made an interesting discovery after suffering the ignomy of having an SSL certificate expire. (Supposedly I'll have it within the next two hours. A late night for me!) It appears from my testing that the expiry time on a certificate is taken from the client's machine time, not the serve