On Thu, 2015-07-23 at 00:29 +0200, Kurt Roeckx wrote:
> On Wed, Jul 22, 2015 at 10:34:53PM +0100, David Woodhouse wrote:
> > On Wed, 2015-07-22 at 23:29 +0200, Kurt Roeckx wrote:
> > > On Wed, Jul 22, 2015 at 09:56:24PM +0100, David Woodhouse wrote:
> > > 
> > > The whole point of this signed timestamp is that the signature
> > > doesn't expire and that you don't have to care about the wall
> > > clock.
> > 
> > ... which is much more simply achieved by just not caring about the
> > validity times of the certificate in the first place.
> 
> In case of a timestamp you can reduce the check to verify that the
> timestamp was in the validity period of the certificate.

Yes. You can. But it's still pointless complexity in a use case where
*every* valid signature would need a corresponding timestamp to ensure
its validity.

I can kind of understand why we might want the timestamp scheme in
circumstances where *some* signatures should be infinitely valid, and
others not.

But in the case where *all* signatures should be infinitely valid, it
just seems entirely gratuitous.

And retrofitting it into a model where the validity is *already* not
being checked is a inviting a whole bunch of breakage for precisely
zero benefit.

-- 
dwmw2

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Reply via email to