openssl cms verification date
Jochen Bern
Jochen.Bern at binect.de
Thu Feb 8 17:53:49 UTC 2024
On 08.02.24 16:27, openssl-users-request at openssl.org digested:
> Date: Thu, 08 Feb 2024 15:46:54 +0100
> From: Tomas Mraz <tomas at openssl.org>
>
> On Thu, 2024-02-08 at 14:13 +0100, Fran?ois Legal wrote:
>> Sure I get the point. You can't really be sure that the signature was
>> made at the clained time as the signerInfo structure is not signed
>> itself. Could you please comment however on why verifying the
>> validity of the certificate at the verification date is better in
>> that matter.
>
> The expiration of the certificate means - albeit in an extreme case -
> that the private key is no longer trusted - i.e., it can do anything
> like malicious signatures of crafted data, etc. So unless you have
> trusted timestamps on the signed document, after the certificate
> expiration, the signature has no validity. Of course this is a little
> bit extreme view but...
Not that calling your official local lawmakers "extremists" will help
you any ... ;-)
(I.e., when people like notaries keep hold of digitally signed documents
for the required time of X years and the signature's validity ends
before that, they're legally required to re-sign document and old
signature(s) with a new signature of their own, which certifies that
they had that data in their possession at a time when the old signature
was still valid. Repeat as necessary for the *really* long-term archival.)
More generally speaking, what you'd *want* to do is to verify the
signature WRT the moment you *yourself* obtained the doc+sig and can
vouch that it hasn't been altered since - but that timestamp cannot be
obtained by technical means (unless you habitually counter-sign right at
*reception*) and "now" is used as a pessimistic approximation.
(... *usually* pessimistic. Had to pontificate on the pitfalls of not
doing NTP or PTP properly just half an hour ago ...)
Kind regards,
--
Jochen Bern
Systemingenieur
Binect GmbH
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 3449 bytes
Desc: S/MIME Cryptographic Signature
URL: <https://mta.openssl.org/pipermail/openssl-users/attachments/20240208/1a1d6240/attachment.p7s>
More information about the openssl-users
mailing list