Re: [openssl-users] Doubt regarding O-SSL and setting the duration of certificates

2017-09-13 Thread Robert Moskowitz



On 09/13/2017 09:31 AM, Michael Richardson wrote:

Robert Moskowitz  wrote:
 > The devices never test out the lifetime of their certs. That is up to

Exactly...
(Do you think about the MacGyver/StarTrek/A-Team/Leverage/MissionImpossible
plot line that goes along with each engineering decision?...)


Never was into watching TV.  Maybe saw half a dozen MI and maybe 4 - 5 
StarTrek, so I really can't answer this...  :)



 > validating servers. And the iDevID is not really intended for operational
 > use. Rather it is the security bootstrap for the lDevID. See the work 
being
 > done in the ANIMA workgroup as an example of what to do with this. 
Michael
 > Richardson, who recently joined this list is working on the related 
Internet
 > Draft(s).

 > I should test out a cert beyond 2038 on my armv7 32 bit Cubieboard. Will 
try
 > that tomorrow

 > I HAVE made certs with this value and I am displaying their content. But 
that
 > system is off right now. I will get one of the samples also tomorrow.

 > And yes, the industry does need to think some about this...

I suspect that the value: literal value 1231235959Z will simply come to
mean "the end of time", even after the year 10,000.  It has a well known
DER encoding, and one can memcmp() it.
Perhaps we will define an OID which means "no expiry", and start including
that.  I don't think the expiry date is an optional part.


Nice thought.  Not really an option.


I will also have example vouchers, voucher requests and ECDSA ("prime256v1")
certs with known private keys (so you can replicate my work) for the ANIMA
BRSKI document, perhaps next week.


Do we agree on the DN and SAN content per 802.1AR?  I am not entirely 
confident with my reading of what I contributed to!  Well at that time I 
left the cert profile to others.  I can send you a whole pki tree zipped 
up.  Do you have any 'live' specimens?




I'd rather publish Curve25519/EdDSA examples, but it's too bleeding edge for 
the moment.


We wait until 1.1.1 ships.  But MAYBE we should be doing builds and 
testing now instead of after it ships...



--
]   Never tell me the odds! | ipv6 mesh networks [


Odds are it won't make a difference.

Bob

--
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] Doubt regarding O-SSL and setting the duration of certificates

2017-09-13 Thread Erwann Abalea via openssl-users

> Le 13 sept. 2017 à 17:08, Michael Wojcik  a 
> écrit :
> 
>> From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf
>> Of Michael Richardson
>> Sent: Wednesday, September 13, 2017 09:32
>> 
>> I suspect that the value: literal value 1231235959Z will simply come to
>> mean "the end of time", even after the year 10,000.  It has a well known
>> DER encoding, and one can memcmp() it.
> 
> Personally, I'm really hoping we're not still using ASN.1 in the year 1.

Why not? ;)

X.680 relies in ISO8601 for the date/time definitions. GeneralizedTime uses the 
Basic format from ISO8601 for the date (year on 4 digits, month on 2 starting 
with 01, day on 2 starting with 01), liberal time of day (minutes and/or 
seconds can be omitted, optional fraction of second/minute/hour depending on 
what is included), and a timezone from -15h to +15h with a one hour or one 
minute accuracy, or Z for UTC.

BER accepts pretty much everything from this definition, DER has a few 
restrictions:
 - in ISO8601, there are 2 different midnights (00:00:00 and 24:00:00), the DER 
encoding requires such date/time to be transformed into 00:00:00 the day after
 - DER only accepts the « Z » timezone and not the +/-HH(MM) variant
 - DER requires the minutes and seconds to be present in the time of day, and 
no fraction of a second

In theory, the very last date/time expressed in ASN.1 is 123124+1500, 
and it would be valid if expressed in BER. In DER, the very last date/time 
would have been 1231235960Z (in case a positive leap second gets inserted 
that day), but something else was preferred. It’s still possible that there’s a 
negative leap second happening at that exact day, removing second 59 completely.
Just think of this as a magical value.

Cordialement,
Erwann Abalea

-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] Doubt regarding O-SSL and setting the duration of certificates

2017-09-13 Thread Robert Moskowitz



On 09/13/2017 09:39 AM, Salz, Rich via openssl-users wrote:

An X509v3 certificate has “notBefore” and “notAfter” fields.  If either of 
those is not present, then it is not an X509v3 certificate.  The time marked by 
those fields is the validity period.

If you want “never expires” X509v3 certificates, the best you can do it put a 
very large value in the notAfter field.  Some software may have issues around 
32bit representation of classic Unix time_t and therefore have problems with 
times greater than 2038; OpenSSL does not have those problems.

The OpenSSL command-line tools do not handle every possible corner case, 
including the ability to reasonably set dates that more than 7,500 years in the 
future.  You will have to modify the source.


It handles notAfter past 2038 (25*365 days from today):

   openssl req -config $dir/openssl-root.cnf\
-set_serial 0x$(openssl rand -hex $sn)\
-keyform $format -outform $format\
-key $dir/private/ca.key.$format -subj "$DN"\
-new -x509 -days 9125 -sha256 -extensions v3_ca\
-out $dir/certs/ca.cert.$format

   openssl x509 -inform $format -in $dir/certs/ca.cert.$format\
-text -noout

...
Validity
Not Before: Sep 13 17:09:50 2017 GMT
Not After : Sep  7 17:09:50 2042 GMT
...

I create 802.1AR cert with:

default_enddate   = 1231235959Z # per IEEE 802.1AR

in the config:

...
Validity
Not Before: Sep  7 04:43:27 2017 GMT
Not After : Dec 31 23:59:59  GMT
...


So it seems you can create things like signing certs with enddates out 
beyond 2038 and you can create EE certs with 'end of time' enddates.


The rest is up to the software that uses these certs...

Bob

--
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] Doubt regarding O-SSL and setting the duration of certificates

2017-09-13 Thread Michael Wojcik
> From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf
> Of Michael Richardson
> Sent: Wednesday, September 13, 2017 09:32
>
> I suspect that the value: literal value 1231235959Z will simply come to
> mean "the end of time", even after the year 10,000.  It has a well known
> DER encoding, and one can memcmp() it.

Personally, I'm really hoping we're not still using ASN.1 in the year 1.

But I'll put something on my calendar for the year  to remediate any 
possible issues in my software around this issue.

-- 
Michael Wojcik 
Distinguished Engineer, Micro Focus 


-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] Doubt regarding O-SSL and setting the duration of certificates

2017-09-13 Thread Salz, Rich via openssl-users
An X509v3 certificate has “notBefore” and “notAfter” fields.  If either of 
those is not present, then it is not an X509v3 certificate.  The time marked by 
those fields is the validity period.

If you want “never expires” X509v3 certificates, the best you can do it put a 
very large value in the notAfter field.  Some software may have issues around 
32bit representation of classic Unix time_t and therefore have problems with 
times greater than 2038; OpenSSL does not have those problems.

The OpenSSL command-line tools do not handle every possible corner case, 
including the ability to reasonably set dates that more than 7,500 years in the 
future.  You will have to modify the source.


-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] Doubt regarding O-SSL and setting the duration of certificates

2017-09-13 Thread Michael Richardson

Robert Moskowitz  wrote:
> The devices never test out the lifetime of their certs. That is up to

Exactly...
(Do you think about the MacGyver/StarTrek/A-Team/Leverage/MissionImpossible
plot line that goes along with each engineering decision?...)

> validating servers. And the iDevID is not really intended for operational
> use. Rather it is the security bootstrap for the lDevID. See the work 
being
> done in the ANIMA workgroup as an example of what to do with this. Michael
> Richardson, who recently joined this list is working on the related 
Internet
> Draft(s).

> I should test out a cert beyond 2038 on my armv7 32 bit Cubieboard. Will 
try
> that tomorrow

> I HAVE made certs with this value and I am displaying their content. But 
that
> system is off right now. I will get one of the samples also tomorrow.

> And yes, the industry does need to think some about this...

I suspect that the value: literal value 1231235959Z will simply come to
mean "the end of time", even after the year 10,000.  It has a well known
DER encoding, and one can memcmp() it.
Perhaps we will define an OID which means "no expiry", and start including
that.  I don't think the expiry date is an optional part.

I will also have example vouchers, voucher requests and ECDSA ("prime256v1")
certs with known private keys (so you can replicate my work) for the ANIMA
BRSKI document, perhaps next week.  I'd rather publish Curve25519/EdDSA
examples, but it's too bleeding edge for the moment.

--
]   Never tell me the odds! | ipv6 mesh networks [
]   Michael Richardson, Sandelman Software Works| network architect  [
] m...@sandelman.ca  http://www.sandelman.ca/|   ruby on rails[



signature.asc
Description: PGP signature
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] Doubt regarding O-SSL and setting the duration of certificates

2017-09-13 Thread Alejandro Pulido
Hello!


Thanks for the response.

I was thinking of setting the duration fo the certificate to infinite,

i.e. the Validity period set to infinite.

Because in the information I have, the only possibility is to set the duration 
(in days) with the command, but the command doesn't allow to put other value 
rather an integer.


Thanks again



Alejandro J Pulido Duque

De: Robert Moskowitz 
Enviado: martes, 12 de septiembre de 2017 14:30:20
Para: openssl-users@openssl.org; Alejandro Pulido
Asunto: Re: [openssl-users] Doubt regarding O-SSL and setting the duration of 
certificates

Depends on the question

'Infinite' duration is used in IEEE 802.1AR Device Identities.  The concept is 
the vendor installs the certificate in read-only memory.  It is expected to be 
good for the life of the device.

On 09/11/2017 05:32 AM, Alejandro Pulido wrote:
Dear team of OpenSSL,

First of all, congratulations for your invaluable work!

I have a question regarding the issue of certificates X.509 with infinite 
duration and I don't know where to submit it.

Please, could you help me?

Thank you very much and kind regards



Alejandro J Pulido Duque



-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users