[ 
https://issues.apache.org/jira/browse/WSS-455?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Andrei Shakirin updated WSS-455:
--------------------------------

    Attachment: SignatureTrustValidator.java.patch
    
> Certificate validation in SignatureTrustValidator
> -------------------------------------------------
>
>                 Key: WSS-455
>                 URL: https://issues.apache.org/jira/browse/WSS-455
>             Project: WSS4J
>          Issue Type: Improvement
>    Affects Versions: 2.0
>            Reporter: Andrei Shakirin
>            Assignee: Colm O hEigeartaigh
>         Attachments: SignatureTrustValidator.java.patch
>
>
> Currently SignatureTrustValidator.verifyTrustInCert() checks if certificate 
> exists in the local keystore.
> If yes, further validation is skipped (if revocationLists is deactivated) and 
> crypto.verifyTrust() is not called.
> To check certificate existence, crypto.getX509Certificates() is used.
> It works correctly if crypto implementation is keystore based (Merlin). But 
> if crypto is implemented using for example XKMS, certificate will be not 
> really validated: existence of certificate in XKMS repository doesn't mean 
> that certificate is valid and trusted.
> Proposal: check additionally crypto implementation and skip 
> crypto.verifyTrust() only if crypto has Merlin implementation.
> Patch is attached.
> Regards,
> Andrei.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to