Re: [openssl-users] Doubt regarding O-SSL and setting the duration of certificates
On 09/13/2017 09:31 AM, Michael Richardson wrote: Robert Moskowitz wrote: > The devices never test out the lifetime of their certs. That is up to Exactly... (Do you think about the MacGyver/StarTrek/A-Team/Leverage/MissionImpossible plot line that goes along with each engineering decision?...) Never was into watching TV. Maybe saw half a dozen MI and maybe 4 - 5 StarTrek, so I really can't answer this... :) > validating servers. And the iDevID is not really intended for operational > use. Rather it is the security bootstrap for the lDevID. See the work being > done in the ANIMA workgroup as an example of what to do with this. Michael > Richardson, who recently joined this list is working on the related Internet > Draft(s). > I should test out a cert beyond 2038 on my armv7 32 bit Cubieboard. Will try > that tomorrow > I HAVE made certs with this value and I am displaying their content. But that > system is off right now. I will get one of the samples also tomorrow. > And yes, the industry does need to think some about this... I suspect that the value: literal value 1231235959Z will simply come to mean "the end of time", even after the year 10,000. It has a well known DER encoding, and one can memcmp() it. Perhaps we will define an OID which means "no expiry", and start including that. I don't think the expiry date is an optional part. Nice thought. Not really an option. I will also have example vouchers, voucher requests and ECDSA ("prime256v1") certs with known private keys (so you can replicate my work) for the ANIMA BRSKI document, perhaps next week. Do we agree on the DN and SAN content per 802.1AR? I am not entirely confident with my reading of what I contributed to! Well at that time I left the cert profile to others. I can send you a whole pki tree zipped up. Do you have any 'live' specimens? I'd rather publish Curve25519/EdDSA examples, but it's too bleeding edge for the moment. We wait until 1.1.1 ships. But MAYBE we should be doing builds and testing now instead of after it ships... -- ] Never tell me the odds! | ipv6 mesh networks [ Odds are it won't make a difference. Bob -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] Doubt regarding O-SSL and setting the duration of certificates
> Le 13 sept. 2017 à 17:08, Michael Wojcik a > écrit : > >> From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf >> Of Michael Richardson >> Sent: Wednesday, September 13, 2017 09:32 >> >> I suspect that the value: literal value 1231235959Z will simply come to >> mean "the end of time", even after the year 10,000. It has a well known >> DER encoding, and one can memcmp() it. > > Personally, I'm really hoping we're not still using ASN.1 in the year 1. Why not? ;) X.680 relies in ISO8601 for the date/time definitions. GeneralizedTime uses the Basic format from ISO8601 for the date (year on 4 digits, month on 2 starting with 01, day on 2 starting with 01), liberal time of day (minutes and/or seconds can be omitted, optional fraction of second/minute/hour depending on what is included), and a timezone from -15h to +15h with a one hour or one minute accuracy, or Z for UTC. BER accepts pretty much everything from this definition, DER has a few restrictions: - in ISO8601, there are 2 different midnights (00:00:00 and 24:00:00), the DER encoding requires such date/time to be transformed into 00:00:00 the day after - DER only accepts the « Z » timezone and not the +/-HH(MM) variant - DER requires the minutes and seconds to be present in the time of day, and no fraction of a second In theory, the very last date/time expressed in ASN.1 is 123124+1500, and it would be valid if expressed in BER. In DER, the very last date/time would have been 1231235960Z (in case a positive leap second gets inserted that day), but something else was preferred. It’s still possible that there’s a negative leap second happening at that exact day, removing second 59 completely. Just think of this as a magical value. Cordialement, Erwann Abalea -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] Doubt regarding O-SSL and setting the duration of certificates
On 09/13/2017 09:39 AM, Salz, Rich via openssl-users wrote: An X509v3 certificate has “notBefore” and “notAfter” fields. If either of those is not present, then it is not an X509v3 certificate. The time marked by those fields is the validity period. If you want “never expires” X509v3 certificates, the best you can do it put a very large value in the notAfter field. Some software may have issues around 32bit representation of classic Unix time_t and therefore have problems with times greater than 2038; OpenSSL does not have those problems. The OpenSSL command-line tools do not handle every possible corner case, including the ability to reasonably set dates that more than 7,500 years in the future. You will have to modify the source. It handles notAfter past 2038 (25*365 days from today): openssl req -config $dir/openssl-root.cnf\ -set_serial 0x$(openssl rand -hex $sn)\ -keyform $format -outform $format\ -key $dir/private/ca.key.$format -subj "$DN"\ -new -x509 -days 9125 -sha256 -extensions v3_ca\ -out $dir/certs/ca.cert.$format openssl x509 -inform $format -in $dir/certs/ca.cert.$format\ -text -noout ... Validity Not Before: Sep 13 17:09:50 2017 GMT Not After : Sep 7 17:09:50 2042 GMT ... I create 802.1AR cert with: default_enddate = 1231235959Z # per IEEE 802.1AR in the config: ... Validity Not Before: Sep 7 04:43:27 2017 GMT Not After : Dec 31 23:59:59 GMT ... So it seems you can create things like signing certs with enddates out beyond 2038 and you can create EE certs with 'end of time' enddates. The rest is up to the software that uses these certs... Bob -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] Doubt regarding O-SSL and setting the duration of certificates
> From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf > Of Michael Richardson > Sent: Wednesday, September 13, 2017 09:32 > > I suspect that the value: literal value 1231235959Z will simply come to > mean "the end of time", even after the year 10,000. It has a well known > DER encoding, and one can memcmp() it. Personally, I'm really hoping we're not still using ASN.1 in the year 1. But I'll put something on my calendar for the year to remediate any possible issues in my software around this issue. -- Michael Wojcik Distinguished Engineer, Micro Focus -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] Doubt regarding O-SSL and setting the duration of certificates
An X509v3 certificate has “notBefore” and “notAfter” fields. If either of those is not present, then it is not an X509v3 certificate. The time marked by those fields is the validity period. If you want “never expires” X509v3 certificates, the best you can do it put a very large value in the notAfter field. Some software may have issues around 32bit representation of classic Unix time_t and therefore have problems with times greater than 2038; OpenSSL does not have those problems. The OpenSSL command-line tools do not handle every possible corner case, including the ability to reasonably set dates that more than 7,500 years in the future. You will have to modify the source. -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] Doubt regarding O-SSL and setting the duration of certificates
Robert Moskowitz wrote: > The devices never test out the lifetime of their certs. That is up to Exactly... (Do you think about the MacGyver/StarTrek/A-Team/Leverage/MissionImpossible plot line that goes along with each engineering decision?...) > validating servers. And the iDevID is not really intended for operational > use. Rather it is the security bootstrap for the lDevID. See the work being > done in the ANIMA workgroup as an example of what to do with this. Michael > Richardson, who recently joined this list is working on the related Internet > Draft(s). > I should test out a cert beyond 2038 on my armv7 32 bit Cubieboard. Will try > that tomorrow > I HAVE made certs with this value and I am displaying their content. But that > system is off right now. I will get one of the samples also tomorrow. > And yes, the industry does need to think some about this... I suspect that the value: literal value 1231235959Z will simply come to mean "the end of time", even after the year 10,000. It has a well known DER encoding, and one can memcmp() it. Perhaps we will define an OID which means "no expiry", and start including that. I don't think the expiry date is an optional part. I will also have example vouchers, voucher requests and ECDSA ("prime256v1") certs with known private keys (so you can replicate my work) for the ANIMA BRSKI document, perhaps next week. I'd rather publish Curve25519/EdDSA examples, but it's too bleeding edge for the moment. -- ] Never tell me the odds! | ipv6 mesh networks [ ] Michael Richardson, Sandelman Software Works| network architect [ ] m...@sandelman.ca http://www.sandelman.ca/| ruby on rails[ signature.asc Description: PGP signature -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] Doubt regarding O-SSL and setting the duration of certificates
Hello! Thanks for the response. I was thinking of setting the duration fo the certificate to infinite, i.e. the Validity period set to infinite. Because in the information I have, the only possibility is to set the duration (in days) with the command, but the command doesn't allow to put other value rather an integer. Thanks again Alejandro J Pulido Duque De: Robert Moskowitz Enviado: martes, 12 de septiembre de 2017 14:30:20 Para: openssl-users@openssl.org; Alejandro Pulido Asunto: Re: [openssl-users] Doubt regarding O-SSL and setting the duration of certificates Depends on the question 'Infinite' duration is used in IEEE 802.1AR Device Identities. The concept is the vendor installs the certificate in read-only memory. It is expected to be good for the life of the device. On 09/11/2017 05:32 AM, Alejandro Pulido wrote: Dear team of OpenSSL, First of all, congratulations for your invaluable work! I have a question regarding the issue of certificates X.509 with infinite duration and I don't know where to submit it. Please, could you help me? Thank you very much and kind regards Alejandro J Pulido Duque -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users