Bonsoir,

Hodie III Non. Mar. MMV est, ohaya scripsit:
> This is the SUB ROOT CA's Cert:
> 
> Certificate:
[...]
>         Validity
>             Not Before: Mar  2 06:08:03 2005 GMT
>             Not After : Feb 27 09:22:27 2008 GMT

A little less than 3 years for the duration is a bit short. Not really
a problem for a non-root CA, though.

[...]
>         X509v3 extensions:
>             X509v3 Basic Constraints: critical
>                 CA:TRUE

Beware of the certificates you'll sign with this one, as you don't
restrict the number of CAs below this one. If you know this CA will
*only* sign end-user certificates (humans, servers, routers for
example), then you can restrict the pathLen of the basicConstraints
extension to '0', and be safer.

>             X509v3 Key Usage: critical
>                 Digital Signature, Certificate Sign, CRL Sign

Unless you'll use this CA to sign messages other than certificates and
CRLs, there's no need to put the 'digitalSignature' bit.

>             X509v3 Authority Key Identifier: 
>                
> keyid:FF:78:E3:03:37:8D:EA:0F:1D:ED:B0:C7:D2:48:49:C6:90:D1:D5:B0

Problem. The issuer of this certificate doesn't have any
subjectKeyIdentifier extension, so this authorityKeyIdentifier
extension is useless, and could potentially be misused. I know that
Mozilla doesn't use the AKI to find the issuing cert, and MSIE does.
But I haven't tested the case where an AKI existed without the
corresponding SKI.

> This is the ROOT CA's Cert:
> 
> Certificate:
>     Data:
>         Version: 1 (0x0)

That's why you don't have any extension on this certificate, it's a
version 1 certificate. Today, that type of certificates should really
be avoided unless serious reasons to use them exist.

[...]
>         Validity
>             Not Before: Mar  2 05:38:29 2005 GMT
>             Not After : Mar  1 09:19:53 2008 GMT

And in 3 years, you'll have to deploy again this root certificate...
Consider the base of your existing clients at that time, and the
estimated work to do...

[...]
>             RSA Public Key: (1024 bit)
>                 Modulus (1024 bit):

...On the other hand, that's only a 1024 bits key, you can't really
create a 20 years certificate with such a key...

> Per earlier messages from Steve Henson, the SUB ROOT CA (CN=ATEST5) has
> "Basic Constraints" with "CA=TRUE", and "Digital Signature, Certificate
> Sign, CRL Sign".

Maybe I haven't followed the thread, but digitalSignature is useless
for a cert and crl signing CA.

-- 
Erwann ABALEA <[EMAIL PROTECTED] is now keynectis}.com>
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to