@mattstevens @tapbot_paul Does that apply to the Mac App Store? It's not mentioned in Apple's sample code.
-
-
@mjtsai@mattstevens two totally diff dates.0 replies 0 retweets 1 like -
@tapbot_paul@mjtsai It’s like a code signing timestamp. If the signing certificate is trusted, you check if it was valid at signing time.0 replies 0 retweets 0 likes -
@mattstevens So if you don't check it, it won't falsely cause validation to fail?0 replies 0 retweets 0 likes -
@mjtsai You check the creation date (when the cert was used) against the certificate’s validity period, vs checking the current time.0 replies 0 retweets 0 likes -
@mjtsai So if the certificate is trusted and was valid at the time it was used you don’t care if it is expired.0 replies 0 retweets 0 likes -
@mattstevens Right. My question is, does Apple's sample code implicitly use the current date? (Guess: No. So this wouldn't be a problem.)0 replies 0 retweets 0 likes -
@mjtsai Looks like no and you’re right, it’s not an issue if you don’t check the validity period at all.0 replies 0 retweets 0 likes -
@mjtsai I was wrong, after testing that code will verify the chain against the current time unless otherwise configured.0 replies 0 retweets 1 like -
@mattstevens curious: how to you tell PKCS7_verify() to check (or not) the creation date? Can't find that in the docs :-(0 replies 0 retweets 1 like
@rbrockerhoff Through the X509_STORE’s verification parameters: https://gist.github.com/mattstevens/fa099d99f2fa7247c65e …
-
-
@mattstevens great, thanks a lot. Will try to implement that now.0 replies 0 retweets 0 likes -
@mattstevens OK, my version of OpenSSL doesn't have X509_V_FLAG_NO_CHECK_TIME yet, but no problem; it works now. Thanks again!0 replies 0 retweets 0 likes
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.
Michael Tsai
Paul Haddad
Matt Stevens
Rainer Brockerhoff