Replies: 1 comment 21 replies
-
Hmm, this definitely should work if the signature was generated correctly---there are unit tests for exactly this kind of scenario... I'm not sure why it fails. Did you embed revocation information at the time of signing? Can you try validating against an older version of pyHanko and Having said that, the LTV validator currently exposed in the CLI is not very good. It has numerous issues, and it's very particular about where to source revocation information from for basically no good reason. The latest version includes an experimental AdES validation engine that is definitely more correct, but (a) that one is still incubating and more difficult to use without specialised knowledge, and (b) not exposed in the CLI at all. If you're up for it, feel free to give it a try. The plan is to deprecate the old LTV validator as soon as the AdES validator is stable. Not sure when that'll happen, though. |
Beta Was this translation helpful? Give feedback.
-
Hello, I have question about validate a signature with a timestamp signed before later revocation of signature certificate (the X.509 file). For example I have PDF files (PKCS#7_T or PAdES_BASELINE_T) which was signed with PKCS#12 file (X.509 file with .pfx or .p12 extension) and during signing timestamps were correctly added. After few weeks X.509 certificate used for signing was revoked. During validation pyhanko evaluates the signature as invalid because signer certificate was revocated. But revocation time is older like signing time in timestamp.
One specific example: This document was signed 2022-12-15T13:41:05+00:00 and cert was revoked revoked at 17:37:53 on 2023-02-08, so in time of signing cert was valid. Why is the signature evaluate like invalid please?
It's possible that I just misunderstood the documentation. Is it possible, please, to perform validation so that the signature is evaluated as valid?
Many thanks.
Beta Was this translation helpful? Give feedback.
All reactions