Hi there


I don't think it would make sense to check for expiration (even in case we 
would have full certificates like PKCS#7 verifiy)

At our point of the boot process we normally do not have access to a trusted 
time/date, so any check could be simply spoofed or even worse fails, because 
wall clock is not initialized properly.



I think even the EFI boot-process (or shim) does not check expiration date of 
their certificates!





What could make sense is a check for an expired certificate/key at signing time 
(including intermed certs), but not sure if this would be a too hard 
restriction (at least for developing/testing). I think a hint for the signer 
should be enough!



Regards

Robert



On Wed, Sep 16, 2020 at 01:19:03AM +0200, Heinrich Schuchardt wrote:

>

On 9/11/20 7:26 PM, Andrii Voloshyn wrote:

> > Hi there,

> >

> >     Does U-boot take into account certificate expiration date when 
> > verifying signed images in FIT? In other words, is date stored along with 
> > the public key in DTB file?

> >

> > Cheers,

> > Andy

> >

>

> Hello Philippe,

>

> looking at padding_pkcs_15_verify() in lib/rsa/rsa-verify.c I cannot

> find a comparison of the date on which an image was signed with the

> expiry date of the certificate. Shouldn't there be a check? Or did I

> simply look into the wrong function?



I think Simon is the right person to answer this question, but



as far as I know, we don't have any device tree property for the expiration 
date of a public key. See doc/uImage.FIT/signature.txt.



-Takahiro Akashi



> Best regards

>

> Heinrich



Reply via email to