|
This problem has been pretty well-researched, but not much published since the research has been associcated with specific applications and not across broader PKI deployments. Much of the research was associated with the SET application so didn't make it out of the bank card associations beyond their security requirements (and then only vaguely suggested). To summarize my own work, it is inappropriate to issue two certs with the same public key with overlapping validity periods. In the event of key comprimise or unauthorized key usage problems, both certificates are impacted even though only one would be listed on a CRL. The integrity of the CA associated with a CERTIFICATE hierarchy would be in question but the overall use of the key across all hierarchies using eh keys would be in question. Its also best practice to gen new keys and not re-use keys after a certificate has expired. Audit of single key usage associated with multiple certificate hierarchies is also a problem. Best practice is to gen a new key pair and create a separate cross-certified hierarchy so that there are unique keys tracked independently. This just solves a lot of problems with key usage and audit. There is no impact on any hierarchy if the keys are retired for any reason. I agree with the feature of OpenCA that disqualifies multiple certificates associated with the same public key. Bill Pierre Scholtes wrote:
|
- [Openca-Users] Re: Re : error 700 Sylvain Masnada
- Re: [Openca-Users] Re: Re : error 700 Michael Bell
- [Openca-Users] several certs with same public key... Pierre Scholtes
- Re: [Openca-Users] several certs with same pu... silverhairbp
- Re: [Openca-Users] several certs with same pu... Michael Bell
- [Openca-Users] R?f. : Re: [Openca-Users] ... Pierre Scholtes
