You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This change-set verifies the signature over the CRL upon every certificate
validation. The way the code previously handled validation was not secure
for the following unlikely (but not impossible) reason: a malicious CA sets
its SKI to match that of another CA under the same MSP. Under this scenario
(and with the previous code), the malicious CA may revoke another CA's
certificates. This is true because the code previously established the
link between CA and CRL at setup time (by verifying the CA's certificate)
and between CA and CRL at validation time (but, crucially, only by matching
SKI and AKI).
A possible optimization would be to pre-verify signatures of CAs over CRLs
and to keep a mapping of verified pairs. However, it's important that the
lookup key of this mapping is not SKI (as it was before).
Change-Id: I25a5a92b319c6565a092d5de7fc96a0548d1a37d
Signed-off-by: Alessandro Sorniotti <[email protected]>
0 commit comments