On Sat, Mar 15, 2008 at 11:36 PM, David Schwartz <[EMAIL PROTECTED]> wrote:
>  For example, suppose I create a public/private keypair that I don't think 
> anyone can break for 50 years. If I make the certificate valid for 30 years 
> because of this, it would obviously be a bad idea to keep the same key for a 
> new certificate. On the other hand, if I make the certificate valid for two 
> years because I can only assure that the identity in the certificate will 
> belong to the key owner for that long, there's no harm in re-using the same 
> key in the next certificate if I know the identity is good for another two 
> years. (The key being safe for 48 years rather than 50 is a negligible 
> difference, but don't renew the certificate for the same key forever.)

Arguably, you shouldn't do it even once, because it's extremely easy
to fall into the pattern of "one key and one key only" in the systems
design or implementation.  I can't remember who coined the phrase, but
it's not "good crypto hygeine".

Granted, there are some circumstances where such a risk is acceptable
[a different threat model than that used by vanilla X.509 or PKIX can
render the risk a non-issue], but in general it should be avoided if
possible.  (and "there's not enough resources available to code it"
isn't really a good reason for calling it "impossible".)

-Kyle H
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to