Skip to content

Commit d88b1d4

Browse files
committed
Add sanity check instructions
1 parent d9cbcf2 commit d88b1d4

File tree

1 file changed

+37
-3
lines changed

1 file changed

+37
-3
lines changed

docs/trust-list.mdx

Lines changed: 37 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -26,13 +26,44 @@ The [contentcredentials.org](https://contentcredentials.org/) site hosts the fol
2626
- **The temporary known anchor list** in https://contentcredentials.org/trust/anchors.pem contains the list of known anchor certificates. If an end-entity [certificate's chain](getting-started.mdx#signing-and-certificates) can be traced back to an anchor certificate on this list, the certificate is considered "known."
2727
- **The configuration file**, https://contentcredentials.org/trust/store.cfg, specifies the [Extended Key Usage (EKU)](https://datatracker.ietf.org/doc/html/rfc9336) values accepted for end-entity certificates. An end-entity certificate must have at least one of the EKUs in this list to be valid.
2828

29+
## Checking your certificate
30+
31+
Perform a preliminary "sanity check" on your certificate before requesting that it be added to the known certificate list.
32+
33+
1. Ensure that C2PA Tool can use the certificate and doesn't return any validation errors by using a command like this:
34+
35+
```
36+
c2patool ./image.jpg trust --allowed_list ./cert.pem
37+
```
38+
39+
Confirm that the result does not contain a `validation_status` field which indicates an error.
40+
41+
1. Confirm that the `signature_info.issuer` field in the manifest is correct. This field determines what Verify displays. In this example, replace "XYZ Inc." with the name of your organization:
42+
43+
```
44+
c2patool ./image.jpg trust --allowed_list ./cert.pem \
45+
| jq --args '.manifests[].signature_info.issuer' "XYZ Inc."
46+
```
47+
48+
1. Perform basic verification of the certificate you're submitting; for example:
49+
50+
```
51+
openssl x509 -noout -text -in 'cert.pem' | grep 'Subject:'
52+
```
53+
54+
Example response:
55+
56+
```
57+
Subject: organizationIdentifier=XYZ-7155227, C=US, ST=Delaware, L=Dover, O=Whatever Inc., SN=xxx, GN=xxx, CN=xxx
58+
```
59+
2960
## Using the known certificate list
3061

3162
You can use the C2PA Tool or the CAI JavaScript library to determine whether a certificate is on the temporary known certificate list.
3263

3364
### Using with C2PA Tool
3465

35-
The [C2PA Tool documentation](c2patool/readme.md#configuring-trust-support) explains how to use the temporary known certificate list with the tool.
66+
The [C2PA Tool documentation](c2patool/docs/usage.md#configuring-trust-support) explains how to use the temporary known certificate list with the tool.
3667

3768
### Using with the JavaScript library
3869

@@ -84,6 +115,9 @@ This code is for illustration purposes only. To ensure acceptable performance, p
84115

85116
## How to add a certificate to the list
86117

87-
If you have an application that is in production and publicly available, you can request to add its signing certificate to the temporary known certificate list: Simply email `[email protected]`.
118+
If you have an application that is in production and publicly available, you can request to add its signing certificate to the temporary known certificate list.
119+
120+
Follow these steps:
88121

89-
We will review your request, and if it is approved, we'll ask for more details. Once we receive them and deploy the change, you will receive a confirmation email.
122+
1. [**Do a preliminary check of your certificate**](#checking-your-certificate) to ensure it meets the requirements for C2PA signing certificates and to be in the Verify temporary certificate list.
123+
1. **Submit your request** by emailing `[email protected]`. We will review your request, and if it is approved, we'll ask for more details. Once we receive them and deploy the update to the trust list, you will receive a confirmation email.

0 commit comments

Comments
 (0)