-
Notifications
You must be signed in to change notification settings - Fork 42
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add more validations for timestamp response #13
Comments
@shizhMSFT - could you consider this as part of the timestamping work your were looking at? |
IMO it makes sense for one engineer to own/drive all the items related to this space. See the linked roadmap item 59. I don't think this is owned by @shizhMSFT at this time. Perhaps @priteshbandi since you've been most involved and recently with this code and all three of these issues have been created by you? |
As per the meeting note on sep, 19th "https://hackmd.io/_vrqBGAOSUC_VWvFzWruZw?view#Sep-19-2022 " this will be moved to RC-2 similar to notaryproject/roadmap#59 |
Removing RC2 milestone as its been tracked in parent issue notaryproject/roadmap#59 |
This issue is stale because it has been opened for 60 days with no activity. Remove stale label or comment. Otherwise, it will be closed in 30 days. |
Issue closed due to no activity in the past 30 days. |
We do need to add more validation for timestamp response to avoid MitM, replay, etc. attacks and also to be a compliant client. The validations are more from timestamp security and correctness perspective. If the timestamp signature is bad then it is of no use for users.
Haven't gone through complete rfc3161 but here are some notable mentions:
Originally posted by @priteshbandi in #11 (comment)
The text was updated successfully, but these errors were encountered: