Extending the key expiration date
Florian Weimer
Florian.Weimer@RUS.Uni-Stuttgart.DE
Thu Sep 6 16:08:02 2001
"Janusz A. Urbanowicz" <alex@bofh.torun.pl> writes:
> > If an attacker obtains your secret key, he can arbitrarily increase
> > the lifetime of the key, thus increasing its value.
>
> It is no more flaw that the one lately announced about not-signing
> date, originator and recipients of the message.
But it's clearly a regression! The V3 key format does not show this
kind of problem.
> By definition if an attacker have your secret key, he can do
> anything. You may call it a flaw in whole pulic key cryptography
> concept.
This is certainly wrong. For example, the attacker cannot override
already distributed revocation certificates. Reliable expiration of
keys is required to be able to cut down the length of certification
revocation lists for most applications. Otherwise, large-scale CAs
might become unusable after a few years of operation.
--
Florian Weimer Florian.Weimer@RUS.Uni-Stuttgart.DE
University of Stuttgart http://cert.uni-stuttgart.de/
RUS-CERT +49-711-685-5973/fax +49-711-685-5898