[Bug 2003701] Re: PKCS7: Message signed outside of X.509 validity window
Dimitri John Ledkov
2003701 at bugs.launchpad.net
Mon Jan 23 12:29:03 UTC 2023
The best we can do, is to take notAfter time of the signing certificate
and add that as the signingTime, which will then be used by the Sign
command as given.
This will ensure the signature is within valid time-series.
I don't see an easy openssl API to sign things without any signature
timestamp.
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/2003701
Title:
PKCS7: Message signed outside of X.509 validity window
Status in openssl package in Ubuntu:
New
Status in sbsigntool package in Ubuntu:
New
Bug description:
When signing UEFI applications, the signature includes signing
timestamp.
Kernels, upon kexec, check that message signature is within the
validity of the X.509 signing certificate.
When using original canonical kernel team test key, I no longer can
kexec kernels, as the test key has expired.
UEFI specifications in general ignore signing time.
IMHO we should remove / not include signing timestamp in the UEFI
signatures to avoid this.
---
i guess openssl needs to provide ability to create signatures without
signingtime attribute.
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/2003701/+subscriptions
More information about the foundations-bugs
mailing list