RE: Accessing encrypted messages after cert expires

2008-03-19 Thread David Schwartz
Michael Sierchio wrote: > I'm not suggesting that this isn't useful, just that it is not > a defect that it isn't part of the key format itself. That may or may not be true, but none of your arguments support this point. I'm learning towards a belief that it is a defect, but I am not thoroughly

Re: Accessing encrypted messages after cert expires

2008-03-19 Thread Kyle Hamilton
On Tue, Mar 18, 2008 at 5:01 PM, Michael Sierchio <[EMAIL PROTECTED]> wrote: > Kyle Hamilton wrote: > > > Certificate issuance is a statement of identity binding for a given > > key at a given assurance. No more, no less. > > No, it isn't. It's often more. Such as...? > > A CA does not and

Re: Accessing encrypted messages after cert expires

2008-03-19 Thread Kyle Hamilton
On Wed, Mar 19, 2008 at 10:45 AM, Michael Sierchio <[EMAIL PROTECTED]> wrote: > Steffen DETTMER wrote: > > > For operational, administrative and forensic concerns I think it > > is important to know the key generation time as well as who > > generated it in exactly which way, who gave the key to

Re: Accessing encrypted messages after cert expires

2008-03-19 Thread Michael Sierchio
Steffen DETTMER wrote: For operational, administrative and forensic concerns I think it is important to know the key generation time as well as who generated it in exactly which way, who gave the key to whom when and why and so on - maybe even including a transactional log of every key usage eve

Re: Accessing encrypted messages after cert expires

2008-03-19 Thread Steffen DETTMER
* Michael Sierchio wrote on Tue, Mar 18, 2008 at 17:01 -0700: > > ... It specifies things that third parties can know and rely > > on. Only the principal itself can know what it's actually > > going to use the key for. > > No, key usage restrictions are certainly within the realm of > what a CA wi

RE: Accessing encrypted messages after cert expires

2008-03-18 Thread David Schwartz
> David Schwartz wrote: > > Michael Sierchio: > >> If it's your policy not to reuse keys, or allow their use beyond > >> the lifespan of the certificate, then the enforcement mechanism > >> for this MUST be in the CA. > I completely disagree. If this were true, CA's would generate > the priva

Re: Accessing encrypted messages after cert expires

2008-03-18 Thread Michael Sierchio
Kyle Hamilton wrote: Certificate issuance is a statement of identity binding for a given key at a given assurance. No more, no less. No, it isn't. It's often more. A CA does not and cannot specify the value of the data which can be encrypted or protected by any given key. Irrelevant to

Re: Accessing encrypted messages after cert expires

2008-03-18 Thread Kyle Hamilton
On Tue, Mar 18, 2008 at 1:58 PM, Michael Sierchio <[EMAIL PROTECTED]> wrote: > David Schwartz wrote: > > Michael Sierchio: > > > >> If it's your policy not to reuse keys, or allow their use beyond > >> the lifespan of the certificate, then the enforcement mechanism > >> for this MUST be in the

Re: Accessing encrypted messages after cert expires

2008-03-18 Thread Michael Sierchio
David Schwartz wrote: Michael Sierchio: If it's your policy not to reuse keys, or allow their use beyond the lifespan of the certificate, then the enforcement mechanism for this MUST be in the CA. I completely disagree. If this were true, CA's would generate the private key as part of the ce

RE: Accessing encrypted messages after cert expires

2008-03-18 Thread David Schwartz
Michael Sierchio: > If it's your policy not to reuse keys, or allow their use beyond > the lifespan of the certificate, then the enforcement mechanism > for this MUST be in the CA. I completely disagree. If this were true, CA's would generate the private key as part of the certificate issuing p

Re: Accessing encrypted messages after cert expires

2008-03-18 Thread Michael Sierchio
David Schwartz wrote: What I think Michael Sierchio was saying, though, was something different. He's not saying to treat a certificate as revoked, he's saying not to issue a certificate. Basically, he's saying a CA could refuse to issue a certificate for any key that it had ever seen before in

Re: Accessing encrypted messages after cert expires

2008-03-18 Thread Michael Sierchio
Kyle Hamilton wrote: On Sun, Mar 16, 2008 at Since it's infeasable to store all of the possible keypairs in the number of atoms in the universe, your assertion holds no water. Did you do the calculation? The number of primes less than or equal to 512 bits in length number around 10**150,

Re: Accessing encrypted messages after cert expires

2008-03-17 Thread Kyle Hamilton
On Mon, Mar 17, 2008 at 12:14 AM, Michael Sierchio <[EMAIL PROTECTED]> wrote: > Kyle Hamilton wrote: > > > A key's lifetime is, cryptographically speaking, the amount of time > > for which it can be expected to provide a sane level of security in > > relation to the value of the data which it pr

RE: Accessing encrypted messages after cert expires

2008-03-17 Thread David Schwartz
Steffen Dettmer wrote: > > > You may argue, and get me to agree, that cert > > > reissue/resigning with the same SubjectPubkeyData is a bad > > > idea. Make 'em generate keypairs. Keep a list forever of > > > pubkeys seen in certs and reject any that appear in CSRs. > (CSR? Is this like a CRL

Re: Accessing encrypted messages after cert expires

2008-03-17 Thread Steffen DETTMER
Hi, interesting thread. I also think that secret and shared keys have attributes as creation or validation date. One very important attribute I would like to mention is the "is revoked" attribute. Of course certificates also can be revoked, but this is something different. Revoked certificates ca

Re: Accessing encrypted messages after cert expires

2008-03-17 Thread Michael Sierchio
David Schwartz wrote: > ... An attacker can start trying to break your key as soon he has your public key. Issuance date of the cert suffices. It's still not an attribute of the private key. In any case, you may of course need to validate an old signature, and the mechanics for that have been

RE: Accessing encrypted messages after cert expires

2008-03-17 Thread David Schwartz
Michael Sierchio wrote: > Anyway, in the case of RSA keypairs we don't manufacture them, we > discover them. They're already there, we just search for our p's and q's > in the appropriate range and rely on chance starting conditions to find > some not in use. I suggested, but not entirely in je

Re: Accessing encrypted messages after cert expires

2008-03-17 Thread Michael Sierchio
Kyle Hamilton wrote: A key's lifetime is, cryptographically speaking, the amount of time for which it can be expected to provide a sane level of security in relation to the value of the data which it protects. Right, which is a matter of consensus best practice, we hope... Of course, cryptog

Re: Accessing encrypted messages after cert expires

2008-03-16 Thread Kyle Hamilton
On Sun, Mar 16, 2008 at 11:27 PM, Michael Sierchio <[EMAIL PROTECTED]> wrote: > David Schwartz wrote: > > > You have to have absolute trust in any entity that will generate or store > your private key. Thus you can trust any information in it -- anyone who > could put in bogus information could

Re: Accessing encrypted messages after cert expires

2008-03-16 Thread Michael Sierchio
David Schwartz wrote: You have to have absolute trust in any entity that will generate or store your private key. Thus you can trust any information in it -- anyone who could put in bogus information could give away your key to strangers. (By absolute trust, I mean with respect to anything yo

RE: Accessing encrypted messages after cert expires

2008-03-16 Thread David Schwartz
> David's apparent statement is "the person trusting the time is the > person generating the key." > Michael's apparent idea is "if you're generating it and including it > in the key format, then you're making an assertion which must > trustable by people other than the person generating the key."

Re: Accessing encrypted messages after cert expires

2008-03-16 Thread Michael Sierchio
Kyle Hamilton wrote: On Sun, Mar 16, 2008 at 10:44 PM, David Schwartz <[EMAIL PROTECTED]> wrote: If you can't trust the system that generates and stores your private key, you're screwed anyway. So I don't see that this argument has any validity. The issue is 'who is trusting what?' David's

Re: Accessing encrypted messages after cert expires

2008-03-16 Thread Kyle Hamilton
On Sun, Mar 16, 2008 at 10:57 PM, Michael Sierchio <[EMAIL PROTECTED]> wrote: > David Schwartz wrote: > > > If you can't trust the system that generates and stores your private key, > you're screwed anyway. So I don't see that this argument has any validity. > > A timestamp is not an attribute o

Re: Accessing encrypted messages after cert expires

2008-03-16 Thread Kyle Hamilton
On Sun, Mar 16, 2008 at 10:44 PM, David Schwartz <[EMAIL PROTECTED]> wrote: > > If you can't trust the system that generates and stores your private key, > you're screwed anyway. So I don't see that this argument has any validity. The issue is 'who is trusting what?' David's apparent statement

Re: Accessing encrypted messages after cert expires

2008-03-16 Thread Michael Sierchio
David Schwartz wrote: If you can't trust the system that generates and stores your private key, you're screwed anyway. So I don't see that this argument has any validity. A timestamp is not an attribute of a private key. It's utterly irrelevant. If your purpose is to require that new certif

RE: Accessing encrypted messages after cert expires

2008-03-16 Thread David Schwartz
> > I have argued many times that not including the creation date > in every private key data format was a *huge* mistake. > Furthermore -- > How do you know what time it is? How do I know you know what time > it is? Do I trust you to put the correct time, or even a monotically > increasing

Re: Accessing encrypted messages after cert expires

2008-03-16 Thread Michael Sierchio
David Schwartz wrote: Arguably, you shouldn't do it even once, because it's extremely easy to fall into the pattern of "one key and one key only" in the systems design or implementation. I can't remember who coined the phrase, but it's not "good crypto hygeine". I have argued many times that n

Re: Accessing encrypted messages after cert expires

2008-03-16 Thread Michael Sierchio
David Schwartz wrote: Arguably, you shouldn't do it even once, because it's extremely easy to fall into the pattern of "one key and one key only" in the systems design or implementation. I can't remember who coined the phrase, but it's not "good crypto hygeine". I have argued many times that n

Re: Accessing encrypted messages after cert expires

2008-03-16 Thread Michael Sierchio
Patrick Patterson wrote: Actually, what you care about are the keys associated with the certificate. For encryption, you've got content that is encrypted with the public key, and decryptable only with the private key. Since the certificate is your public key signed by some Certificate Authorit

RE: Accessing encrypted messages after cert expires

2008-03-16 Thread David Schwartz
> Arguably, you shouldn't do it even once, because it's extremely easy > to fall into the pattern of "one key and one key only" in the systems > design or implementation. I can't remember who coined the phrase, but > it's not "good crypto hygeine". I have argued many times that not including the

Re: Accessing encrypted messages after cert expires

2008-03-16 Thread Mick
On Sunday 16 March 2008, David Schwartz wrote: > > Doesn't what you suggest create a headache? Every time I want to > > decrypt an > > old message I sent or I received, or a file, I will need to > > change the mail > > client configuration and point it to another private key. > > One would hope yo

Re: Accessing encrypted messages after cert expires

2008-03-16 Thread Kyle Hamilton
On Sat, Mar 15, 2008 at 11:36 PM, David Schwartz <[EMAIL PROTECTED]> wrote: > For example, suppose I create a public/private keypair that I don't think > anyone can break for 50 years. If I make the certificate valid for 30 years > because of this, it would obviously be a bad idea to keep the sa

Re: Accessing encrypted messages after cert expires

2008-03-16 Thread Patrick Patterson
Hello Mick: Mick wrote: > Yes it does. Keeping the same private key and generating new public key with > it seems to be a sensible thing to do from a practical point of view. > Be careful - first of all - you can't "generate a new public key" - you can generate a new certificate request, but

RE: Accessing encrypted messages after cert expires

2008-03-16 Thread David Schwartz
> Doesn't what you suggest create a headache? Every time I want to > decrypt an > old message I sent or I received, or a file, I will need to > change the mail > client configuration and point it to another private key. One would hope your mail client will allow you to keep any number of k

Re: Accessing encrypted messages after cert expires

2008-03-15 Thread Kyle Hamilton
On Sat, Mar 15, 2008 at 12:12 PM, Mick <[EMAIL PROTECTED]> wrote: > On Saturday 15 March 2008, Kyle Hamilton wrote: > > It's rather infeasable to keep the same private key and generate a new > > public key. If you keep the private key after the expiration of the > > certificate, you can still d

Re: Accessing encrypted messages after cert expires

2008-03-15 Thread Mick
On Saturday 15 March 2008, Kyle Hamilton wrote: > It's rather infeasable to keep the same private key and generate a new > public key. If you keep the private key after the expiration of the > certificate, you can still decrypt messages encrypted to it; thus, if > you generate a new pub/priv pair,

Re: Accessing encrypted messages after cert expires

2008-03-15 Thread Kyle Hamilton
It's rather infeasable to keep the same private key and generate a new public key. If you keep the private key after the expiration of the certificate, you can still decrypt messages encrypted to it; thus, if you generate a new pub/priv pair, you just need to keep the old key, and use all the keys

Re: Accessing encrypted messages after cert expires

2008-03-14 Thread Mick
On Friday 14 March 2008, Patrick Patterson wrote: > Hi Mick: > > On Friday 14 March 2008 16:43:28 Mick wrote: > > Hi All, > > > > I am not sure what happens under the following scenario. I use an SSL > > certificate (e.g. from CaCert.org) to encrypt and sign a file and or an > > email message. La

Re: Accessing encrypted messages after cert expires

2008-03-14 Thread Patrick Patterson
Hi Mick: On Friday 14 March 2008 16:43:28 Mick wrote: > Hi All, > > I am not sure what happens under the following scenario. I use an SSL > certificate (e.g. from CaCert.org) to encrypt and sign a file and or an > email message. Later on the certificate expires. I renew the certificate, > load