Ives Steglich wrote:

with the note:
signature valid if the signature has been prior to expiration or suspending/revokation
and the statement the cert is not valid (expired) and red (suspended/revoked) anymore
with date of statuschange of course


with signature invalid:
if the signature has been issued after expiration date, suspend/revoke
and the note that the cert is invalid (expired, suspended, revoked) with date


so to the question of valid/invalid signatures: (just had some input from micha)

i'll try to put this a bit more ordered here:

a signature is valif if:
 - the cert is valid
   (and not suspended or revoked - this is special case)

a signature renders invalid if:
 - created outside cert lifetime (so before or after)
 - created with an suspended/revoked cert depending on reason

so there i think it may be necessary to introduce revocation groups
 - one that renders all created signatures invalid
   (like key stolen, lost, since the trust is broken)
 - one that renders signatures invalid after suspend/revocation date
   (like revoked because user wanted this by its own and there is
    no emergency reason like in the above group)
    so this group would just limit the lifetime of the cert
    to put in relation to this


and which of those cases has openca to handle? commonly there will be only a realtime check - so no data with 'old' signatures will be verified

one case which may occur:

a operator signed a request (crr or csr) but the ca processes it after the end of lifetime of the operator certificate, so if we assume we would have a trusted timestamp there - we would have the case, the signature is valid, since the data and time of signing is inside the lifetime and therefore has to be rendered valid instead of what an 'realtime' check would get an invalid

at current state - the system would render the signature valid, because the expire check isn't implemented ;o) but if, than it would render it at the ca invalid, because the lifetime of operator certificate is exceeded...


i think, this problem will occur relativly seldom, so for the moment, this can be handeld as feature request? or should it get a bug? when to render signature invalid and so on... since the question of an trustworthy timestampservice is included there to and so on

so in general i would suggest:
expired and suspended/revoked certs just render signatures invalid
and we just check 'realtime' so like the signature would have just been made
and gets now validated...

special cases get on the feature requests and are put for now to the known issues?



greetings
dalini
--
Ives Steglich                Email: [EMAIL PROTECTED]
System Administration        Tel.:  +49 (0)3677 - 69 4382/4383
                             Fax:   +49 (0)3677 - 69 4399

Fraunhofer Institute for Digital Media Technology
Langewiesener Strasse 22
98693 Ilmenau                Email (private): [EMAIL PROTECTED]
Germany                      http://www.openca.org                      


------------------------------------------------------- This SF.Net email is sponsored by BEA Weblogic Workshop FREE Java Enterprise J2EE developer tools! Get your free copy of BEA WebLogic Workshop 8.1 today. http://ads.osdn.com/?ad_id=4721&alloc_id=10040&op=click _______________________________________________ OpenCA-Devel mailing list [EMAIL PROTECTED] https://lists.sourceforge.net/lists/listinfo/openca-devel

Reply via email to