Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

VerificationError for expired certificate even though there's a valid countersignature #6

Closed
MrCrumbs opened this issue Apr 20, 2020 · 1 comment

Comments

@MrCrumbs
Copy link

In the following sample the SolarWinds certificate is valid to ‎Friday, ‎February ‎7, ‎2020 2:59:59 AM, however Windows accepts this as a valid signature, because there's a countersignature (Symantec SHA256 TimeStamping Signer - G3) that is valid and was signed on ‎Monday, ‎August ‎26, ‎2019 5:52:39 PM.

For some reason, Signify fails to verify the signature, saying that it expired, even though there's a valid countersignature:

VerificationError: Chain verification from CN=Solarwinds Worldwide\, LLC, O=Solarwinds Worldwide\, LLC, L=Austin, ST=Texas, C=US(serial:156211740539252461235167966181669418108) failed: The path could not be validated because the end-entity certificate expired 2020-02-06 23:59:59Z

I might be missing something, so please feel free to explain and close the issue if this is expected behavior. Thanks!

Sample:
SolarWinds MSP Patch Management Engine Setup.zip

@ralphje
Copy link
Owner

ralphje commented Apr 21, 2020

You are correct. The timestamp is present in the unauthenticated attributes with OID 1.3.6.1.4.1.311.3.3.1. This appears to be a RFC3161 response, which is included in Microsoft's own namespace. I'll look into this.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants