> OpenSSL currently thinks that the DN can be used as a primary key for
> certificates

Yeah, that's way too simple-minded.

>   One first step to make things right is to use the DN
> plus any key identifier that may be available

The nice thing about key (and/or cert) identifiers is that there's so many
to choose from.  To steal a phrase. :)

> Possibly it makes sense to stop searches at
> the first matching certificate that is valid according to the system
> clock

That won't work.  It's common practice to issue certs with overlapping
validity periods. And if the key is on tamper-evident hardware, there's
no reason not to recertify the same keypair.

>  we'd just claim it's their fault alone.

Unfortunately it'd be "our" fault alone.

The only really valid search key is <subject,issuer,serial>
        /r$

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to