Hello Watson,

On Fri, Jun 20, 2025 at 10:50 PM Watson Ladd <watsonbl...@gmail.com> wrote:

>
> What exactly is the rationale here? Do we expect that identies
> actually change when a certificate expires?
>

Certificate confirms identity information for a certain period of validity
as long as it is not revoked. Communication with an endpoint that produces
a revoked or expired certificate is deemed to have unacceptable risk and
typically denied. However, this risk applies to established sessions in
exactly the same way as it applies to new sessions. The rationale is to
ensure that the peer identity is still valid by the time the original
certificate expired or got revoked.

TLS 1.2 and prior could perform re-key and re-authentication through
rehandshake. As the very generic rehandshake carried unacceptable security
risks it was removed in TLS 1.3. Extended Key Update brings back re-key in
a secure way. Similarly, Certificate Update proposal is intended to bring
back re-authentication in a very limited controlled fashion.

Best Regards,
Yaroslav

-- 


This communication (including any attachments) is intended for the sole 
use of the intended recipient and may contain confidential, non-public, 
and/or privileged material. Use, distribution, or reproduction of this 
communication by unintended recipients is not authorized. If you received 
this communication in error, please immediately notify the sender and then 
delete all copies of this communication from your system.
_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to