On 8/9/22 4:12 PM, Eric Rescorla wrote:
n Tue, Aug 9, 2022 at 4:08 PM Benjamin Kaduk <bka...@akamai.com> wrote:

    On Tue, Aug 09, 2022 at 03:59:01PM -0700, Eric Rescorla wrote:
>

3. Are you aware of some other set of rules for certificate issuance that require
revocation after the certificate has expired?

Removing certs from revocation lists after the certificate has expired is pretty much required in any scalable deployment which has a non-trivial time horizon (basically any commercial CA). That is because the list would grow without bounds.

It's not necessary to solve the 'Getting started, clock not set yet' feature, however. For that case you only need to ignore 'not Before' when validating a TLS cert associated with an NTS call. You can always arrange for the unset clock to be older than the current time, so if the cert is expired based on the unset clock, the cert is expired for real.

bob


-Ekr



_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to