Closed GoogleCodeExporter closed 9 years ago
Attaching patch.
Link to downstream ticket in SignServer: https://jira.primekey.se/browse/DSS-727
Original comment by markuski...@gmail.com
on 7 Feb 2014 at 11:12
Attachments:
XML-DSIG has some rules about this:
http://www.w3.org/TR/xmldsig-core/#sec-X509Data.
It states that X509Data elements should only contain certificates that are part
of the chain.
Also it states that if multiple X509Certificate are present within the same
X509Data element, at least one of them should refer to the validation key.
do you think there's value on enforcing these rules? I don't know if Apache
Santuario is checking this (or the other rules on the link above).
Probably it's better to just collect all the certificates, no matter their
organization, as suggested on your patch.
Original comment by luis.fgoncalv
on 7 Feb 2014 at 11:36
Original comment by luis.fgoncalv
on 7 Feb 2014 at 11:36
I don't think being a little bit more relaxed than the XML-DSIG specification
in this aspect would be a problem. There could be documents with totally
unrelated certificates included but that shouldn't cause any issues.
Original comment by markuski...@gmail.com
on 7 Feb 2014 at 1:33
Agreed. I'll apply the patch when possible. Tks!
Original comment by luis.fgoncalv
on 7 Feb 2014 at 2:09
I ended up also searching for IssuerSerial and SubjectName on all the
ds:X509Data elements. r254.
Original comment by luis.fgoncalv
on 8 Feb 2014 at 12:04
Original issue reported on code.google.com by
markuski...@gmail.com
on 7 Feb 2014 at 11:10