You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I created a CRL whose revocation date is later than current time. MbedTLS does not use this CRL because it thought that the CRL is illegal (see the code in /library/x509_crt.c, line 1788). Comparatively, openssl does not check the "revocation date" field and revokes certificate(s).
The openssl guys explained that "revocation date” is useless in certificate validation and may only be used as meta data (see openssl/openssl#11859). I indeed checked RFC 5280 and did not find any words saying that "revocation date" is important (for certificate parsing and validation). Then do we still need to check the revocation date?
Result of MbedTLS:
. Loading the CA root certificate ... ok (0 skipped)
. Loading the certificate(s) ... ok
. Peer certificate information ...
cert. version : 3
serial number : 01
issuer name : C=CN, ST=SH, O=SJTU, OU=DDST, CN=NCRL
subject name : C=GB, ST=Berkshire, L=Newbury, O=My Company Ltd
issued on : 1996-08-01 00:00:00
expires on : 2020-12-31 23:59:59
signed using : RSA with SHA-256
RSA key size : 2048 bits
basic constraints : CA=true
. Verifying X.509 certificate...
Verify requested for (Depth 1):
cert. version : 3
serial number : F5:34:01:4D:DA:77:4E:2F
issuer name : C=CN, ST=SH, O=SJTU, OU=DDST, CN=NCRL
subject name : C=CN, ST=SH, O=SJTU, OU=DDST, CN=NCRL
issued on : 2020-03-26 08:27:49
expires on : 2023-01-14 08:27:49
signed using : RSA with SHA-256
RSA key size : 2048 bits
basic constraints : CA=true, max_pathlen=3
key usage : Digital Signature, Non Repudiation, Key Encipherment, Key Cert Sign, CRL Sign
This certificate has no flags
Verify requested for (Depth 0):
cert. version : 3
serial number : 01
issuer name : C=CN, ST=SH, O=SJTU, OU=DDST, CN=NCRL
subject name : C=GB, ST=Berkshire, L=Newbury, O=My Company Ltd
issued on : 1996-08-01 00:00:00
expires on : 2020-12-31 23:59:59
signed using : RSA with SHA-256
RSA key size : 2048 bits
basic constraints : CA=true
This certificate has no flags
ok
Result of OpenSSL:
C = GB, ST = Berkshire, L = Newbury, O = My Company Ltd
error 23 at 0 depth lookup: certificate revoked
error leaf.pem: verification failed
Description
Bug
OS
ubuntu 16.04.1 [linux|
mbed TLS build:
Version: 2.16.5
I created a CRL whose revocation date is later than current time. MbedTLS does not use this CRL because it thought that the CRL is illegal (see the code in /library/x509_crt.c, line 1788). Comparatively, openssl does not check the "revocation date" field and revokes certificate(s).
The openssl guys explained that "revocation date” is useless in certificate validation and may only be used as meta data (see openssl/openssl#11859). I indeed checked RFC 5280 and did not find any words saying that "revocation date" is important (for certificate parsing and validation). Then do we still need to check the revocation date?
The command I used is:
The verification returns
Result of OpenSSL:
root.pem
leaf.pem
test.crl
The text was updated successfully, but these errors were encountered: