Skip to content

Conversation

@zipus
Copy link
Contributor

@zipus zipus commented Dec 2, 2025

Closes #281

@kislyuk
Copy link
Member

kislyuk commented Dec 2, 2025

Thanks, this looks great!

FYI: SHA1 is deprecated for digital signatures due to cryptographic weaknesses. I'm totally on board with this change, but I will eventually make this code use a different digest algorithm by default; using SHA1 will require passing a custom setting. I will let you know here when I get around to that. For now, this is good.

@kislyuk
Copy link
Member

kislyuk commented Dec 2, 2025

Hmm it looks like there are some CI failures, I'll have to take a look.

@zipus
Copy link
Contributor Author

zipus commented Dec 2, 2025

Hmm it looks like there are some CI failures, I'll have to take a look.

Ok, let me know if u need anything from my side.

@zipus
Copy link
Contributor Author

zipus commented Dec 2, 2025

Hmm it looks like there are some CI failures, I'll have to take a look.

While developing on my end other modules depending on signxml I found tests failing due to some certs not having COUNTRY_NAME, ORGANIZATION_NAME, ORGANIZATIONAL_UNIT_NAME, COMMON_NAME. Might be that?

@kislyuk
Copy link
Member

kislyuk commented Dec 4, 2025

The changes look correct, I'll adjust the tests in master. Merging

@kislyuk kislyuk merged commit 42bc7bf into XML-Security:main Dec 4, 2025
1 of 22 checks passed
@kislyuk
Copy link
Member

kislyuk commented Dec 6, 2025

Hi @zipus, I will most likely have to revert this change. The XAdES specification states that this element must not be present:
image

You are welcome to maintain this functionality in a fork or subclass, of course.

@zipus
Copy link
Contributor Author

zipus commented Dec 6, 2025

Hi @kislyuk, thanks for your time and effort. I will report the spec statement to gov.

@zipus
Copy link
Contributor Author

zipus commented Dec 12, 2025

The XAdES specification states that this element must not be present

The European rules related to digital signatures (COMMISSION IMPLEMENTING DECISION (EU) 2015/1506) states that the technical rule to follow is ETSI TS 103 171.

In that spec, it indicates that SigningCertificate is required:
image

This may change in the future with spec eIDAS 2.0, but actually this is what EU states for.

@kislyuk
Copy link
Member

kislyuk commented Dec 13, 2025

Thank you for researching this @zipus, I will keep the change but make it conditional on a setting that enables the profile described in the spec you linked. Hoping to get to this over the winter break starting next week.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

XAdES EPES: facturae/CAOC requires legacy SigningCertificate with specific X509IssuerName format

2 participants