Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Optionally allow expired signing certificates? #51

Open
joesiltberg opened this issue Nov 29, 2019 · 2 comments
Open

Optionally allow expired signing certificates? #51

joesiltberg opened this issue Nov 29, 2019 · 2 comments

Comments

@joesiltberg
Copy link

joesiltberg commented Nov 29, 2019

When validating a signature, the function verifyCertificate verifies that the certificate hasn't expired. Since we've already verified that the certificate is one we trust, it would be nice if we could as an option skip the check of the certificate's notBefore/notAfter.

I can get around it by setting a fake clock to the cert's notBefore in the validation context (and calling Validate multiple times if there are multiple certificates). But it would be nice if you could set a flag in ValidationContext instead.

For context, see also crewjam/saml#234

Would you consider such a feature? I can provide a PR if you wish.

@pboyd04
Copy link
Contributor

pboyd04 commented Sep 8, 2020

Don't know if you still need this or not, but I've got a call in my fork of this project that includes this ability. It's in version 1.2.0

@joesiltberg
Copy link
Author

Awesome @pboyd04 ! I have an ugly workaround that works for my own needs, but it would be nice to get rid of that.

This was for https://github.com/crewjam/saml/ , I don't know if they'd be interested in changing package. There doesn't seem to be much activity in russellhaering/goxmldsig so perhaps it's a good idea to change to something actively maintained.

Ping @crewjam

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants