S/MIME email that I received >1 year ago shows invalid signature, although it's valid
Categories
(MailNews Core :: Security: S/MIME, defect)
Tracking
(Not tracked)
People
(Reporter: BenB, Unassigned)
References
Details
(Whiteboard: [psm-smime])
Attachments
(1 file)
50.92 KB,
image/png
|
Details |
Reporter | ||
Comment 1•16 years ago
|
||
Reporter | ||
Comment 2•16 years ago
|
||
Updated•15 years ago
|
Comment 5•6 years ago
|
||
Reporter | ||
Comment 6•6 years ago
|
||
Comment 7•6 years ago
|
||
Comment 8•6 years ago
|
||
Reporter | ||
Comment 9•6 years ago
|
||
Comment 10•6 years ago
|
||
Reporter | ||
Comment 11•6 years ago
|
||
Comment 12•6 years ago
|
||
Reporter | ||
Comment 13•6 years ago
|
||
Comment 14•6 years ago
|
||
Comment 15•6 years ago
|
||
Reporter | ||
Comment 16•6 years ago
|
||
Comment 17•6 years ago
|
||
Reporter | ||
Comment 18•6 years ago
|
||
Comment 19•6 years ago
|
||
Updated•6 years ago
|
Comment 20•4 years ago
|
||
Dear TB developers: any intentions to fix this bug?
Updated•2 years ago
|
Comment 21•6 months ago
|
||
I created a test case with messages signed with an expired and renewed certificate. I have not tested messages signed with a revoked certificate. I investigated the behavior of the latest Thunderbird (version 128.0.1esr). Certificate expiration dates and message signing dates:
Certificates:
-------------
ROOT
Issued: 2000-01-01 00:00:00
Expires: 2100-01-01 00:00:00
|
USER EXPIRED
Issued: 2000-01-01 00:00:00
Expires: 2024-01-01 00:00:00
|
USER RENEWED
Issued: 2024-01-01 00:00:00
Expires: 2048-01-01 00:00:00
Messages S/MIME:
----------------
* signedData/expired_cert_01.eml
signingTime: 1999-01-01 12:00:00
* signedData/expired_cert_02.eml
signingTime: 2000-06-21 12:00:00
* signedData/expired_cert_03.eml
signingTime: 2025-01-01 12:00:00
* signedData/renewed_cert_01.eml
signingTime: 2023-01-01 12:00:00
* signedData/renewed_cert_02.eml
signingTime: 2024-06-20 12:00:00
* signedData/renewed_cert_03.eml
signingTime: 2049-01-01 12:00:00
expired_cert_02.eml
and renewed_cert_02.eml
are technically correct. In this ticket, the problem is to display the correct status of the signed message when expired_cert_02.eml
is opened. Th. now displays the following status:
The certificate used to sign the message was issued by a certificate authority that you do not trust for issuing this kind of certificate.
To add something relevant to this report, my suggestions:
- [expired cert
expired_cert_02.eml
] status [WARNING], see: bug#482799#c10, bug#482799#c15 - [revoked cert] status [INVALID], see: gpgsm ticket
See related ticket: bug#1912613, and package: smime_time_tests.tar.gz
.
I also placed test emails from The Bat!
, which are signed by external TSA. When Th. will handle timestamps the above statuses could look like the following (timestamped messages):
- [expired cert] status [VALID],
- [revoked cert] status [WARNING]
No requirement is imposed concerning the correctness of the signing
time, and acceptance of a purported signing time is a matter of a
recipient's discretion. It is expected, however, that some signers,
such as time-stamp servers, will be trusted implicitly.
Of course, the time stamps are signed by TSA private key, TSA cert also have a validity period.
Comment 22•6 months ago
|
||
Description
•