[openssl-dev] [openssl.org #3951] [RFC][PATCH] Allow certificate time checks to be disabled

David Woodhouse dwmw2 at infradead.org
Wed Jul 22 22:41:36 UTC 2015


On Thu, 2015-07-23 at 00:29 +0200, Kurt Roeckx wrote:
> On Wed, Jul 22, 2015 at 10:34:53PM +0100, David Woodhouse wrote:
> > On Wed, 2015-07-22 at 23:29 +0200, Kurt Roeckx wrote:
> > > On Wed, Jul 22, 2015 at 09:56:24PM +0100, David Woodhouse wrote:
> > > 
> > > The whole point of this signed timestamp is that the signature
> > > doesn't expire and that you don't have to care about the wall
> > > clock.
> > 
> > ... which is much more simply achieved by just not caring about the
> > validity times of the certificate in the first place.
> 
> In case of a timestamp you can reduce the check to verify that the
> timestamp was in the validity period of the certificate.

Yes. You can. But it's still pointless complexity in a use case where
*every* valid signature would need a corresponding timestamp to ensure
its validity.

I can kind of understand why we might want the timestamp scheme in
circumstances where *some* signatures should be infinitely valid, and
others not.

But in the case where *all* signatures should be infinitely valid, it
just seems entirely gratuitous.

And retrofitting it into a model where the validity is *already* not
being checked is a inviting a whole bunch of breakage for precisely
zero benefit.

-- 
dwmw2
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/x-pkcs7-signature
Size: 5691 bytes
Desc: not available
URL: <http://mta.openssl.org/pipermail/openssl-dev/attachments/20150722/8fd2442d/attachment-0001.bin>


More information about the openssl-dev mailing list