Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Get rid of the Certificate Verification functionality #11

Closed
dlwyatt opened this issue Mar 6, 2015 · 3 comments
Closed

Get rid of the Certificate Verification functionality #11

dlwyatt opened this issue Mar 6, 2015 · 3 comments

Comments

@dlwyatt
Copy link
Owner

dlwyatt commented Mar 6, 2015

By specifying a certificate thumbprint (or object, etc), we're already saying we trust the key pair associated with that hash, regardless of whether it's self-signed or expired, etc. (The certificate is really just a container for a key pair at that point; we're bypassing the chain of trust stuff, and don't even care about the identity that the certificate was issued to.)

With that in mind, it's time to deprecate the -SkipCertificateVerification switch and just make that the default behavior.

@BladeFireLight
Copy link

That puts the validation upstream to what ever got the thumbprint. That's fine if its manual. But if its acquired programmatically can you still validate it if need be?


From: Dave Wyattmailto:notifications@github.com
Sent: ‎3/‎6/‎2015 11:09 AM
To: dlwyatt/ProtectedDatamailto:ProtectedData@noreply.github.com
Subject: [ProtectedData] Get rid of the Certificate Verification functionality (#11)

By specifying a certificate thumbprint (or object, etc), we're already saying we trust the key pair associated with that hash, regardless of whether it's self-signed or expired, etc. (The certificate is really just a container for a key pair at that point; we're bypassing the chain of trust stuff, and don't even care about the identity that the certificate was issued to.)

With that in mind, it's time to deprecate the -SkipCertificateVerification switch and just make that the default behavior.


Reply to this email directly or view it on GitHub:
#11

@dlwyatt
Copy link
Owner Author

dlwyatt commented Mar 6, 2015

Yep, anyone can do that (though the functionality wouldn't be part of the ProtectedData module itself). Right now, when you don't set the -SkipCertificateVerification switch, you get three checks performed inside the module:

  • It makes sure the certificate's NotBefore date isn't in the future.
  • It makes sure the certificate's NotAfter date isn't in the past.
  • It makes sure that calling the certificate's Verify() method returns $true.

If your workflow requires these checks before you use the certificate, you could do that before calling the Protect-Data / Unprotect-Data / etc commands.

@dlwyatt
Copy link
Owner Author

dlwyatt commented Mar 6, 2015

Implemented in 4.1.0.

@dlwyatt dlwyatt closed this as completed Mar 6, 2015
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants