Hello Mick:

Mick wrote:
<snip>
> Yes it does.  Keeping the same private key and generating new public key with 
> it seems to be a sensible thing to do from a practical point of view.
> 

Be careful - first of all - you can't "generate a new public key" - you
can generate a new certificate request, but it will use the same public
key as used in the now expired certificate - that's just how asymmetric
cryptosystems work.

And, the longer that a particular keypair is used, the higher the
likelihood that that key will be broken or compromised. That's one of
the reasons that most CA's have fairly short validity periods for user
certificates and keys. And just to short circuit the discussion of "But
I'm using 2048 bit keys, so I'm OK", you are probably using SHA-1 in the
signature algorithm, which isn't necessarily OK. And please talk to
Microsoft about backporting SHA256 into their operating systems before
Vista so that we can fix that particular problem... everything else
supports SHA-256, except most widely deployed versions of Windows. :)

Speaking of validity periods, you should check with your CA to find out
what their key lifetime rules are - most are the same as for the
certificate, although I've seen variations. The key lifetimes should be
listed in the Certificate Policy of the CA that you are using.

Have fun.

---
Patrick Patterson
Chief PKI Architect
Carillon Information Security Inc.
http://www.carillon.ca

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to