You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
For validation of long term signatures, xades4j needs to know when specific
hash functions, algorithms and algorithm parameters are considered insecure.
For example, signature based on a certificate with MD5 based signature, created
in 1995 and timestamped with 1024 bit RSAwithSHA with 20 year validity would be
still considered valid right now (even without use of XAdES-X-L or XAdES-A).
Similarly, a signature with 512 bit RSAwithSHA made in 1995 with valid
Timestamp would still be considered valid right now.
In the future we will need similar information about SHA-1 and 1024bit RSA.
Depending on threat model, they may be considered insecure now.
This creates a requirement of configuration file containing information
defining which hash functions, general algorithms or algorithms with specific
parameters were secure up to which date.
I suggest use of a configuration file because people are more likely to update
configuration files than code in legacy applications.
I don't know of any ready-to-use standards of such files.
Related: issue 18.
Original issue reported on code.google.com by [email protected] on 25 Sep 2012 at 12:40
The text was updated successfully, but these errors were encountered:
Original issue reported on code.google.com by
[email protected]
on 25 Sep 2012 at 12:40The text was updated successfully, but these errors were encountered: