Thanks for your quick answer. I agree the first point, however the
second one it is not clear for me yet. I suppose it is for security
reasons. Would you said me what risks are mitigated with that feature?


Regards

-
Alvaro

On 10 September 2012 02:05, iText Info <[email protected]> wrote:
> Op 10/09/2012 1:29, Alvaro Cuno schreef:
>> Everything is ok and all digital signatures are valid, however I don't
>> understand why the internal structures of the signed documents (see
>> attached files) are different?
> 1. You're not using the most recent version of iText; the type of
> signature you're using will be deprecated in PDF 2.0. ISO-32000-2
> recommends: “To support backward compatibility, PDF readers should
> process this value for the /SubFilter key but PDF writers shall not use
> this value for that key.” Please upgrade to the latest iText version and
> use a different type of signature.
> 2. The only thing you need to know, is this: you're using bad software
> if you're able to produce two binary identical PDF files by running the
> same program twice. Object numbers shouldn't matter.
>
> ------------------------------------------------------------------------------
> Live Security Virtual Conference
> Exclusive live event will cover all the ways today's security and
> threat landscape has changed and how IT managers can respond. Discussions
> will include endpoint security, mobile security and the latest in malware
> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
> _______________________________________________
> iText-questions mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/itext-questions
>
> iText(R) is a registered trademark of 1T3XT BVBA.
> Many questions posted to this list can (and will) be answered with a 
> reference to the iText book: http://www.itextpdf.com/book/
> Please check the keywords list before you ask for examples: 
> http://itextpdf.com/themes/keywords.php

------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
iText-questions mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/itext-questions

iText(R) is a registered trademark of 1T3XT BVBA.
Many questions posted to this list can (and will) be answered with a reference 
to the iText book: http://www.itextpdf.com/book/
Please check the keywords list before you ask for examples: 
http://itextpdf.com/themes/keywords.php

Reply via email to