
Guide to Time Stamping Servers: Digital Signature & Code Signing Protocols
A timestamp server authenticates the exact time when digital signatures and code signing were performed. Here's how timestamping works and how to use it effectively:
Basic Process:
- Hash your code/documents
- Sign the hash with your private key
- Create a signature block containing the digital signature and certificate
- Timestamp the signature block using a timestamp service
- Bind the timestamped signature block to your original content
Sectigo Timestamp Server URL: http://timestamp.sectigo.com
Supported Timestamping Protocols:
RFC 3161 Protocol
- Used by modern SignTool with "/tr" parameter
- Compatible with applications like jarsigner
- Automatically selects appropriate signature algorithm (RSA/SHA-256, RSA/SHA-384, or RSA/SHA-512)
- Algorithm selection based on specified hash algorithm
Authenticode Protocol
- Used by older SignTool versions with "/t" parameter
- Compatible with SignCode
- Uses RSA/SHA-384 by default
- Custom algorithm selection available by adding "?td=<hash_algorithm>" to URL
- Example: http://timestamp.sectigo.com?td=sha256
Important Usage Notes:
- Add 15-second delays between multiple timestamp requests
- For eIDAS compliance, use: http://timestamp.sectigo.com/qualified
- Timestamping ensures long-term validity of signatures even after certificate expiration
Best Practices:
- Always timestamp your signatures when code signing
- Use RFC 3161 protocol when possible for better algorithm flexibility
- Follow rate limiting guidelines to ensure reliable service
- Choose appropriate hash algorithms based on security requirements
This timestamping process creates a trusted time record that validates when code or documents were signed, enhancing the security and reliability of digital signatures.
Related Articles
Root Causes 440: Understanding Public Key Directories and Modern Security Solutions
