[xmlsec] Signature Verification Problem Using X509 Certificates

Aleksey Sanin aleksey at aleksey.com
Mon Feb 18 09:08:58 PST 2008


I have no idea what "target kdm certificate" is :) Please, attach
a signed document to the email.

Aleksey

Paul Keeler wrote:
> Here is a link to an online generator of signed documents that will 
> demonstrate the behaviour I described previously:
> 
> http://www.cinecert.com/dci_ref_01/
> 
> Is there perhaps something about these documents that means xmlsec is 
> unable to populate a store of untrusted certificates?
> 
> Many thanks for your help already.
> 
> 
> On Feb 14, 2008 5:29 PM, Aleksey Sanin <aleksey at aleksey.com 
> <mailto:aleksey at aleksey.com>> wrote:
> 
>     The error indicates that verification of one of the certificate
>     chains failed but xmlsec was able to extract the key either from
>     another certificate chain or from some other place. Hard to say
>     more w/o looking at the document.
> 
>     Aleksey
> 
> 
> 
>     Paul Keeler wrote:
>      > I would be grateful if somone could help me with this problem.  I
>     have a
>      > signed document which reports that it verifies ok, but also gives an
>      > error message: "unable to get local issuer certificate".  The
>     same thing
>      > happens both running from my own application and calling xmlsec
>     from the
>      > command line:
>      >
>      > xmlsec1 --verify --id-attr:<my_ID_attribute_name>
>      > <my_node_namespace_uri>:<my_first_node_name>
>      > --id-attr:<my_ID_attribute_name>
>      > <my_node_namespace_uri>:<my_second_node_name> --trusted-pem
>      > <my_trusted_root_pem>  <my_signed_document>
>      >
>      > This is the result:
>      >
>      >
>     func=xmlSecOpenSSLX509StoreVerify:file=x509vfy.c:line=351:obj=x509-store:subj=unknown:error=71:certificate
>      > verification failed:err=20;msg=unable to get local issuer certificate
>      > OK
>      > SignedInfo References (ok/all): 2/2
>      > Manifests References (ok/all): 0/0
>      >
>      > The verification seems to have been successful (indicated by
>     "OK"), but
>      > clearly an error was also reported.
>      >
>      > The signed document contains my entire certificate chain: Signer ->
>      > Intermediate CA -> Root CA.  The Root CA in the chain is the same
>     as the
>      > trusted root pem I pass using the --trusted-pem option, so I would
>      > expect verification to succeed.
>      >
>      > Now, I can make the error message go away by extracting the
>     Intermediate
>      > CA certificate from the signed document and passing it to XMLSEC
>     using
>      > the --untrusted-pem option:
>      >
>      > xmlsec1 --verify --id-attr:<my_ID_attribute_name>
>      > <my_node_namespace_uri>:<my_first_node_name>
>      > --id-attr:<my_ID_attribute_name>
>      > <my_node_namespace_uri>:<my_second_node_name> --trusted-pem
>      > <my_trusted_root_pem> --untrusted-pem <intermediate_CA_pem>
>      > <my_signed_document>
>      >
>      > I did not expect that I would have to explicitly pass a
>     certificate from
>      > the chain to xmlsec and flag it as being untrusted.  Am I doing
>      > something wrong?  Surely xmlsec should assume that all X509
>     certificates
>      > in a chain are untrusted by default?  Have I missed the point
>     somewhere?
>      >
>      > Many thanks in advance.
>      >
>      >
>      >
>     ------------------------------------------------------------------------
>      >
>      > _______________________________________________
>      > xmlsec mailing list
>      > xmlsec at aleksey.com <mailto:xmlsec at aleksey.com>
>      > http://www.aleksey.com/mailman/listinfo/xmlsec
> 
> 
> 
> ------------------------------------------------------------------------
> 
> _______________________________________________
> xmlsec mailing list
> xmlsec at aleksey.com
> http://www.aleksey.com/mailman/listinfo/xmlsec



More information about the xmlsec mailing list