You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Assume a usage of DDS Security where the same CA is used for both permissions and identity. The certificates issued to particpants allow them to sign documents. Assume the participant generates a permissions file and then signs it. Chain verification causes verification attempts to succeed since the signing certificate, i.e., the participant's certificate, can be chained back to the permission CA's certificate (which is also the identity CA).
Implement the suggestion in ros2/sros2#282. Specifically, use PKCS7_NOINTERN to not accept any signatures in the signed document. This, in turn, requires the use of the certs parameter to PKCS7_verify. PKCS7_NOVERIFY is used since the permissions CA certificate will not be chain verified.
MiguelCompany
changed the title
Chain of trust issues with a single CA certificate
[16903] Chain of trust issues with a single CA certificate
Feb 2, 2023
Is there an already existing issue for this?
Expected behavior
I'll quote the same succinctly put issue filled over for OpenDDS here:
OpenDDS/OpenDDS#3992 (comment)
Current behavior
ros2/sros2#282 (comment)
Steps to reproduce
ros2/sros2#282 (comment)
Fast DDS version/commit
Example call site for reference:
Fast-DDS/src/cpp/security/accesscontrol/Permissions.cpp
Line 518 in 5076ebc
Platform/Architecture
Other. Please specify in Additional context section.
Transport layer
Default configuration, UDPv4 & SHM
Additional context
Fast-DDS v2.6.2 ships with ROS 2 Humble
XML configuration file
No response
Relevant log output
No response
Network traffic capture
No response
The text was updated successfully, but these errors were encountered: