On Monday, 15 July 2019 04:41:12 UTC+10, Ryan Sleevi  wrote:
> Thanks for mentioning this here.
> 
> Could you explain why you see it as an issue? RFC 5280 defines a trust
> anchor as a subject and a public key. Everything else is optional, and the
> delivery of a trust anchor as a certificate does not necessarily imply the
> constraints of that certificate, including expiration, should apply.
> 

Hi Ryan,

Thanks for your message.

First of all, I never said that was an issue. I was just reporting some expired 
Root CA, as I was thinking that may impact peoples.

Secondly, I was not aware of the RFC 5280 defining a trust anchor as a subject 
and a public key.
However, if you referrer to the same RFC, they defined a Public Key in the 
"4.1.2.5. Validity" Section:

  "When the issuer will not be able to maintain status information until
   the notAfter date (including when the notAfter date is
   99991231235959Z), the issuer MUST ensure that no valid certification
   path exists for the certificate after maintenance of status information is 
terminated. 
   This may be accomplished by expiration or
   revocation of all CA certificates containing the public key used to
   verify the signature on the certificate and discontinuing use of the
   public key used to verify the signature on the certificate as a trust
   anchor."

In the case of the "certdata.txt", this file is including Public CA 
certificates. So an expired certificate means that the key cannot be used 
anymore.

I'm still not expressing this message as an issue, but an suggestion to 
update/remove those expired Public Keys from your certdata.txt.

Cheers,
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to