Re: What does 'openssl ts -verify' verify exactly?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



> On Feb 16, 2021, at 1:34 PM, Hubert Kario <hkario@xxxxxxxxxx> wrote:
> 
> the whole problem is that if you trust the date in the timestamp as the date the timestamp was created, attacker can compromise the TSA key years after
> it was last used and then create timestamps that look like they have been
> created while the TSA key was still valid

Timestamps can only be deemed authentic if they are part of a Merkle
chain that validates all past timestamps signed with a *currently*
still trusted key.  The trusted key can change from time to time,
but the Merkle chain needs to be append-only.

Once a given Merkle chain is abandoned, and no longer has an active
signer attesting to the validity of long-ago events, at some point
it becomes impossible to say anything meaningful about the integrity
of past signatures.

-- 
	Viktor.





[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux