An updated webrev at

  http://cr.openjdk.java.net/~weijun/8166222/webrev.01/

Some more changes:

- TSA cert chain validation is performed in both verification and signing. The exit code for validation failure when -strict is specified is 64.

- printCert() and validateCertChain() know about they are dealing with TSA cert chain and do not touch any flag except for tsaChainNotValidated. Code being a little ugly.

- TSA certs lines added to -verbose -certs.

BTW, the code change also fixed https://bugs.openjdk.java.net/browse/JDK-8180289.

Here is an example:

$ jarsigner -verify -strict ts2.jar -verbose -certs

s k      75 Mon May 22 22:49:06 CST 2017 META-INF/MANIFEST.MF

      [entry was signed on 5/22/17, 10:49 PM]
      >>> Signer
      X.509, CN=signer (signer)
      [certificate is valid from 5/22/17, 10:49 PM to 12/8/17, 10:49 PM]
      X.509, CN=CA (ca)
      [certificate is valid from 4/12/17, 10:49 PM to 10/29/17, 10:49 PM]
      >>> TSA
      X.509, CN=ts
      [certificate is valid from 5/22/17, 10:49 PM to 12/8/17, 10:49 PM]
      [ExtendedKeyUsage extension does not support timestamping]
[TSA CertPath not validated: Extended key usage does not permit use for TSA server]

        305 Mon May 22 22:49:08 CST 2017 META-INF/SIGNER.SF
       3096 Mon May 22 22:51:06 CST 2017 META-INF/SIGNER.RSA
smk       1 Mon May 22 22:48:56 CST 2017 A

      [entry was signed on 5/22/17, 10:49 PM]
      >>> Signer
      X.509, CN=signer (signer)
      [certificate is valid from 5/22/17, 10:49 PM to 12/8/17, 10:49 PM]
      X.509, CN=CA (ca)
      [certificate is valid from 4/12/17, 10:49 PM to 10/29/17, 10:49 PM]
      >>> TSA
      X.509, CN=ts
      [certificate is valid from 5/22/17, 10:49 PM to 12/8/17, 10:49 PM]
[TSA CertPath not validated: Extended key usage does not permit use for TSA server]


  s = signature was verified
  m = entry is listed in manifest
  k = at least one certificate was found in keystore

- Signed by "CN=signer"
    Digest algorithm: SHA-256
    Signature algorithm: SHA256withRSA, 2048-bit key
  Timestamped by "CN=ts" on Mon May 22 14:49:08 UTC 2017
    Timestamp digest algorithm: SHA-256
    Timestamp signature algorithm: SHA1withRSA, 2048-bit key

jar verified, with signer errors.

Error:
This jar contains entries whose TSA certificate chain is not validated. Reason: Extended key usage does not permit use for TSA server

Thanks
Max


On 04/12/2017 11:52 PM, Weijun Wang wrote:
Please take a review at

    http://cr.openjdk.java.net/~weijun/8166222/webrev.00/

The major code change is inside SignatureFileVerifier.java. Now if the timestamp on a signed jar is invalid (For example, using a weak algorithm now disabled), the jar file will be treated as a signed jar without a timestamp. Before this change, it was treated unsigned.

In jarsigner/Main.java, I also add a line to validate the TSA cert chain. If not validated, a warning will be shown which is similar to the one when signer cert chain is not validated. If -strict is on, exit code will change too.

I also make a small change at

    http://cr.openjdk.java.net/~weijun/8166222/root/webrev.00/

The executeCommand() method shows more info (mainly stdout and stderr outputs) than executeProcess().

Because of the behavior change and new warnings, this change will need a Compatibility and Specification Review (CSR). At the moment, please review the code change first.

Thanks
Max

Reply via email to