On 05/28/10 02:51 PM, Brock Pytlik wrote:
On 05/28/10 02:07 PM, Jeffrey Hutzelman wrote:
--On Tuesday, May 25, 2010 01:33:45 PM -0700 Bart Smaalders <[email protected]> wrote:

Note that package manifests contain an FMRI, which includes the timestamp
of the date of publication.  This is part of the hash text
for the signature, and thus cannot be modified w/o invalidating
all the signatures.

You mean, the timestamp the person creating the signature wishes you to _believe_ was the date of publication. The two are not necessarily the same thing. Checking that the key used to create a signature was valid on some date contained in the signed content is the same as not checking the expiration at all, because _the signer can lie about the timestamp_.

Yes, and if you don't trust the publisher, who is the signer, not to fake the timestamp, don't add them as a publisher to your image because clearly they shouldn't be trusted to deliver content to your system either. Note that a third party cannot change the timestamp without invalidating the publishers original timestamp.

Sorry, I meant "the publisher's original signature" not timestamp.
[snip]
Brock
_______________________________________________
security-discuss mailing list
[email protected]

Reply via email to