-
Notifications
You must be signed in to change notification settings - Fork 0
Open
Labels
enhancementNew feature or requestNew feature or request
Description
Description
Currently, tpm-trust only checks for revocation of the leaf certificate (EK certificate) but does not verify revocation status for intermediate certificates in the chain. This creates a potential security gap where a compromised or revoked intermediate CA certificate could still be trusted.
Current Behavior
In internal/validate/certificate.go, the revocation check is performed as follows:
if !cfg.SkipRevocationCheck {
crlUrls, err := c.prepareUrls(cfg.EK.Certificate.CRLDistributionPoints)
// ... downloads and verifies CRL only for cfg.EK.Certificate
if crl.IsRevoked(cfg.EK.Certificate) {
return ErrCertificateRevoked
}
}This only checks the leaf certificate's revocation status.
Expected Behavior
The revocation check should be performed for:
- ✅ The leaf certificate (EK) - already implemented
- ❌ All intermediate CA certificates in the chain - missing
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
enhancementNew feature or requestNew feature or request