Difference between revisions of "Failure to validate certificate expiration"
|Line 1:||Line 1:|
|Line 68:||Line 67:|
Revision as of 13:05, 16 May 2006
The failure to validate certificate operation may result in trust being assigned to certificates which have been abandoned due to age.
- Integrity: The data read from the system vouched for by the expired certificate may be flawed due to malicious spoofing.
- Authentication: Trust afforded to the system in question - based on the expired certificate - may allow for spoofing attacks.
- Design: Certificate expiration handling should be performed in the design phase.
- Languages: All
- Platforms: All
Minor trust: Users must attempt to interact with the malicious system.
Likelihood of exploit
Avoidance and mitigation
- Design: Check for expired certificates and provide the user with adequate information about the nature of the problem and how to proceed.
When the expiration of a certificate is not taken in to account, no trust has necessarily been conveyed through it; therefore, all benefit of certificate is lost.
if (!(cert = SSL_get_peer(certificate(ssl)) || !host) foo=SSL_get_veryify_result(ssl); if ((X509_V_OK==foo) || (X509_V_ERRCERT_NOT_YET_VALID==foo)) //do stuff