Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Public Key Woes #24

Closed
urda opened this issue Jun 18, 2017 · 2 comments
Closed

Public Key Woes #24

urda opened this issue Jun 18, 2017 · 2 comments
Assignees
Labels

Comments

@urda
Copy link
Owner

urda commented Jun 18, 2017

Just saw the following notice:

The public key certificate used to verify beacon records expired on 7 May, 2017. However, the beacon remains operational and continues to sign messages with the same private key. Users may continue to use the expired certificate to verify records until we publish a new self-signed certificate in the near future.


Related Issues Tracking

@urda
Copy link
Owner Author

urda commented Jun 18, 2017

A few thoughts:

  • If there is a way to verify signatures, and ignore the expired date on the public certificate, we should handle that case and still turn out verified records.
  • If we cannot ignore the expired date, we will need to do something like:
    • Ignore verification all together and treat all records after the expire date invalid (most correct, but most problematic)
    • Bypass verification (seems very incorrect, completely bypasses proper record verification)
    • Ignore verification, add some type of indicator that it's possibly due to expired certificate (seems like a decent compromise)

@urda
Copy link
Owner Author

urda commented Jun 20, 2017

Actually it looks like the public certificate is not at fault here. Closing this issue.

@urda urda closed this as completed Jun 20, 2017
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

1 participant