Certificate signature integrity check #141
Replies: 4 comments 1 reply
-
Hi Patrick, Honestly not sure and I'd have to dig through a ton of code to check – but the scenario is unlikely because:
Cheers, |
Beta Was this translation helpful? Give feedback.
-
Hi Mike, It is indeed a very unlikely scenario. When building an off-line top-level hierarchy, chances are errors are not immediately noticed. This may even be after a couple of lengthy and costly ceremonies. When doing a risk analysis of this whole process, we came up with this scenario. Remediating this "black swan" risk is very simple of course, so I was curious if any of you ever considered this. If you are not sure, then maybe we should build in a manual check in the ceremony itself. Best regards, |
Beta Was this translation helpful? Give feedback.
-
Here is the code that verifies the cert with the public key before returning it. |
Beta Was this translation helpful? Give feedback.
-
Thanks a ton Tomas for looking into this! Best regards, |
Beta Was this translation helpful? Give feedback.
-
Hi there,
I just came across this thought experiment, and could not find an answer on it in the EJBCA docs, so I hope somebody here could shed some light on it.
When EJBCA has generated a certificate and has signed it using a private key on an HSM, does it do a final integrity check on the signaature (using its issuer's public key) before issuance?
This would be a check against the extremely low probability of 1. a bit flip in a public key in transit from the HSM (after key pair generation), 2. a bit flip of a private key on the HSM, or 3. a bit flip in a signature in transit from the HSM.
Best regards,
Patrick
Beta Was this translation helpful? Give feedback.
All reactions