On Mon, Dec 2, 2013 at 3:28 PM, Eddy Nigg <[email protected]> wrote:
> On 12/02/2013 08:38 PM, From Brian Smith:
>
>> Why? Could you please explain what problem would be created if the renewed
>> certificates had a different (later) notBefore time?
>
> certificate has been, can't have a earlier before-date than the issuer (or
> at least shouldn't). But it can still correctly chain to the new one which
> is usually the whole idea of such PKI acrobatics. :-)

AFAICT, this is not correct, and the reason it isn't correct is
exactly to support the type of thing we're talking about here. When
validating a certificate chain at a given time T (usually the current
time), each certificate in the chain must have notBefore <= T <=
notAfter. There is no constraint in RFC 5280 defining any relation
between the notBefore and notAfter dates between certificates in the
chain.

An implementation that requires the validity period of the issuer's
certificate to subsume the validity period of the issued certificate
would be implementing a non-standard and overly-restrictive
constraint. Let's see some evidence of a web browser that does enforce
such a non-standard constraint, before we attempt to accommodate such
creatures.

See also 
http://stackoverflow.com/questions/9234796/does-the-expiration-status-of-an-issuers-certificate-affect-a-subjects-expirat

Cheers,
Brian
-- 
Mozilla Networking/Crypto/Security (Necko/NSS/PSM)
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to