I'm trying to wrap my head around the OCSP revocationTime for D-Link's certificate.
I recently answered another question and ended up drafting a timeline.
That timeline is basically this:
Jul 5 00:00:00 2012 GMT. Validity: Not Before
Feb 27 2015 Inadvertent disclosure
--- six months of nothing ---
Sep 3 00:00:00 2015 GMT. OCSP "revocationTime" backdated to this.
--- one day of invalidity (?) ---
Sep 3 23:59:59 2015 GMT. Validity: Not After
Sep 17 2015 Tweakers.net report
Sep 18 2015 TheRegister.co.uk report
Sep 20 14:00 2015 Is-it-revoked-yet?-question posted.
Sep 20 2015 Answer posted. OCSP `good`
Sep 22 2015 Update answer posted. OCSP `revoked`
And the question is this:
- Does D-Link's move retroactively invalidate just 1 day of possible use/misuse of their key?
Or asked differently:
- Will an (hypothetical) EXE signed on Sep 2 with the stolen key STILL work, despite the revocation?
And as a side/background question:
- What is the general idea with OCSP's
revocationTime? Are you supposed to backdate that to the first point in time that you think the key was compromised? (I tried to do my research. But I'm stuck. I couldn't find the explanation in the OCSP RFC. And a 2012 post on the PKIX mailing list by Martin Rex, didn't exactly clear things up for me either.)