-
Notifications
You must be signed in to change notification settings - Fork 44
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Revocation check control for timestamp verification #303
Comments
As suggested by @priteshbandi, it is desired that the revocation check in timestamp verification be configurable by the user. Because a user may not want any network roundtrip during verification.
(The similar may apply to /cc: @yizha1 as also involved in the discussion |
@gokarnm Do you have any better idea? |
Based on discussion in the 6/24/24 community meeting, option 2, adding an extra field |
Let's surface "Timestamp Revocation check" as a new top level validation similar to "Revocation check", and they can be overridden using the "timestampRevocation" with values as "enforce", "log", "skip". |
Can we have an example for the first proposal also posted? It is hard to imagine how the trust policy will look for #305 if there is no example in this issue or in the PR. |
@toddysm Do you mean an example for #306? The example for 305 is shown above:
An example for 306 would be:
Based on 7/1/24 community meeting, the following is an
|
@gokarnm Are you expecting a new property "override" under "signatureVerification"? |
@gokarnm I would suggest we go for the original proposal by Patrick #303 (comment) (as implemented in PR #305). The reasons are:
Hope it helps. |
The comment about invalid policy #303 (comment) has merit, the same is applicable to
|
Yes that is correct, something like
|
Can we have all the possible combinations of the following fields for
My concern is that this will result in a long list of permitations and some of the combinations will be incompatible. It will be easy for user to create an incompatible combination and hard to troubleshoot (which will inherently reduce the security). I would suggest that we start with the use-cases (descfribe them well) and then try to figure out what would be the appropriate fields (columns) and values for them. |
Based on 7/8/24 community meeting discussion, we've moved this issue to Future milestone. |
Shouldn't this be governed by revocation configuration in trust policy ?
Originally posted by @priteshbandi in #290 (comment)
The text was updated successfully, but these errors were encountered: