I should mention that on the [EMAIL PROTECTED] list, there's been a fair amount
of discussion on this topic.  The concept that is put forth is that
the trust anchor is the key -- and any metadata that the key surrounds
itself with (such as a certificate, for ease of trust anchor
distribution) is non-binding.

This gets into the concept of "key continuity management" for an
entity as opposed to hierarchal trust for the entity.  This is
unfortunately a concept which is foreign to most X.509
implementations.

My view?  If a trust anchor asserts its validity ending on a given
date, that's a policy decision asserted by that trust anchor (even
though a CA is identified by its name, not by its key).

-Kyle H

On 4/15/07, Paul Hoffman <[EMAIL PROTECTED]> wrote:
> This is very good to hear. I have no idea if this is true for other
> browsers or OS components that have root stores.
>
> Man, this would be a good research project for some adventurous undergrad.
> _______________________________________________
> dev-tech-crypto mailing list
> dev-tech-crypto@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-tech-crypto
>


-- 

-Kyle H
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to