Python implementation of the RFC3161 specification, using pyasn1
A simple client library for cryptographic timestamping service implementing the protocol from RFC3161.
This started as a fork of https://dev.entrouvert.org/projects/python-rfc3161 and has some additional patches such as Python3 support.
The latest version of this library is available from https://github.com/trbs/rfc3161ng/ .
There are several timestamping services around. Here is a list of publicly available services you can try:
>>> import rfc3161ng >>> certificate = open('data/certum_certificate.crt', 'rb').read() >>> rt = rfc3161ng.RemoteTimestamper('http://time.certum.pl', certificate=certificate) >>> tst = rt.timestamp(data=b'John Doe') >>> rt.check(tst, data=b'John Doe') True >>> rfc3161ng.get_timestamp(tst) datetime.datetime(2017, 8, 31, 15, 42, 58, tzinfo=tzutc())
Verifying timestamp using OpenSSL
One can verify the timestamp returned by the timeserver by using OpenSSL. For example with:
$ openssl ts -verify -data data_file.txt -in data_file.tsr -CAfile cacert.pem -untrusted tsa.crt
To save the tsr you can use code similar to:
>>> from pyasn1.codec.der import encoder >>> import rfc3161ng >>> ... >>> timestamper = rfc3161ng.RemoteTimestamper('http://freetsa.org/tsr', certificate=certificate_data) >>> tsr = timestamper(data=data_file.read(), return_tsr=True) >>> with open("data_file.tsr", "wb") as f: >>> f.write(encoder.encode(tsr))
Alternatively you can just save the raw response.content returned from the certification server.
There is a test which also covers this in test_verify_timestamp_response_with_openssl.
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
|Filename, size & hash||File type||Python version||Upload date|
|rfc3161ng-2.1.1-py2.py3-none-any.whl (8.8 kB) View hashes||Wheel||py2.py3|
|rfc3161ng-2.1.1.tar.gz (20.2 kB) View hashes||Source||None|
Hashes for rfc3161ng-2.1.1-py2.py3-none-any.whl