Issue 103420 - Enable revokation checking
Summary: Enable revokation checking
Status: CLOSED FIXED
Alias: None
Product: General
Classification: Code
Component: www (show other issues)
Version: current
Hardware: PC All
: P3 Trivial (vote)
Target Milestone: OOo 3.3
Assignee: h.ilter
QA Contact: issues@framework
URL:
Keywords:
: 63537 103444 (view as issue list)
Depends on:
Blocks:
 
Reported: 2009-07-08 17:30 UTC by kraynopp
Modified: 2017-05-20 10:24 UTC (History)
2 users (show)

See Also:
Issue Type: DEFECT
Latest Confirmation in: ---
Developer Difficulty: ---


Attachments

Note You need to log in before you can comment on or make changes to this issue.
Description kraynopp 2009-07-08 17:30:47 UTC
There is no OCSP/CRL checking performed during verification of documents
(signatures made with revoked 
certificates appear to be valid for OpenOffice). In Windows everything is ok,
Linux version is affected.
Comment 1 joachim.lingner 2009-07-09 15:05:48 UTC
.
Comment 2 joachim.lingner 2009-07-09 15:13:28 UTC
.
Comment 3 joachim.lingner 2009-07-10 06:09:49 UTC
.
Comment 4 joachim.lingner 2009-07-10 06:24:06 UTC
Accepted and setting target.
Comment 5 joachim.lingner 2009-07-10 06:31:21 UTC
*** Issue 103444 has been marked as a duplicate of this issue. ***
Comment 6 joachim.lingner 2009-07-10 06:34:44 UTC
Revokation checking should be implemented for all platforms.
Comment 7 joachim.lingner 2009-07-22 12:10:37 UTC
*** Issue 63537 has been marked as a duplicate of this issue. ***
Comment 8 kraynopp 2009-08-01 10:36:50 UTC
I am sorry for disturbance, but please take into consideration one moment from
closed issue 103444. My certificate has "Trusted Timestamping" extended key
usage (1.3.6.1.5.5.7.3.8) so users should trust the date and time when the
document has been signed. Consequently if document signed when the certificate
still valid, the signature should be considered as valid even after revokation
of the certificate.
Comment 9 joachim.lingner 2009-08-03 10:49:54 UTC
Time stamps are not supported yet. In the end it depends on what algorithm is
used to validate a signature. It would be good if one could tell exactly to what
specification or rules the algorithm conforms to. For example one could say the
algorithm implements RFC 3280 or conforms to the German Signature Act, etc. 
Comment 10 kraynopp 2009-08-03 19:57:27 UTC
Maybe another decision exists.
The fact is that the OCSP responder must return the date and time of revokation
(for revoked certificate, of course). The CRL must include this information
also. Unfortunately digital signature does not include the information when the
document has been signed. At least I could not be able to find it but you do (or
find another way). In the window where all signatures listed I find the date and
time when the document has been signed (last column). I suppose if you compare
this information with date and time when the certificate has been revoked (from
OCSP response or CRL, I prefer OCSP) it will be enough to make right decision
about status of signature.
Comment 11 kraynopp 2009-08-11 17:41:20 UTC
Maybe RFC 3852 (part 11.3) will be useful.
Comment 12 kraynopp 2009-08-15 16:38:42 UTC
By the way have you got any plans to implement trusted timestamping? If yes,
maybe RFC 5126 "CMS Advanced Electronic Signatures (CAdES)" will be useful
(especially part 5.11). This RFC contains example validation sequence also.

I'll be glad if this information will help you.
Comment 13 joachim.lingner 2009-08-17 10:15:02 UTC
Thanks for the information. CAdES is indeed very interesting. However, I would
not implement  it (or parts of it) myself. I'd rather use an external library,
which is already well tested. 
Comment 14 kraynopp 2009-08-18 17:45:08 UTC
I suppose Bouncy Castle Crypto API for java
(http://www.bouncycastle.org/java.html) can support CAdES. At least some
elements of RFC 3126 (predecessor of RFC 5126) are implemented. Anyway
developers of this library can answer exactly.
Comment 15 joachim.lingner 2009-10-22 09:55:21 UTC
Change to 'defect'. If the revokation status cannot be checked then the
validation must fail. Only if one can determine that the certificate is NOT
revoked, then the certificate can be valid (RFC 3280, 6.1.3 Basic Certificate
Processing).
Comment 16 joachim.lingner 2009-11-24 12:02:13 UTC
@HI: Please verify.

As a first step the verification  will disregard missing revocation information
and only use available information (crl, clr distribution point, AIA OCSP).

We will later create a setting in the options dialog where the user can switch
on strict revocation checking.
Comment 17 joachim.lingner 2009-11-24 12:08:33 UTC
.
Comment 18 h.ilter 2010-03-02 10:38:11 UTC
Verified with cws jl137= OK
Signature gets valid or invalid regarding the given revocation list.
Tested locale, with ocsp responder and http server