Unfortunately, this did not work. I'll need to look again at the code and our patch do decouple the signing from the timestamping to figure out what goes wrong here.
Not to self: we likely need to adapt my patch for osslsigncode so that the -h option is available for the add command as well.
Yes, that is needed (among other things). It took me longer to figure this issue out because I got confused. While osslsigncode verify shows the certs in the SHA-1 Authenticode scenario it does not show them when switching to RFC 3161 mode with SHA-256 which sent me digging into wrong direction. Not sure if that's an osslsigncode bug or not.
Either way, one can extract the signature with osslsigncode extract-signature and then inspect the nitty-gritty details with openssl pkcs7 and the SHA-256 timestamp is visible. I uploaded a test file for further inspection if needed:
Signature verification: okNumber of signers: 1 Signer #0: Subject: /businessCategory=Private Organization/jurisdictionC=US/jurisdictionST=Washington/serialNumber=39070/street=#203/street=80 S Washington St/postalCode=98104/C=US/ST=Washington/L=Seattle/O=The Tor Project, Inc./CN=The Tor Project, Inc. Issuer : /C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert EV Code Signing CA (SHA2) Serial : 0F622EF31D0F1EF94E520DBD7A43E58CNumber of certificates: 4 Cert #0: Subject: /C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert EV Code Signing CA (SHA2) Issuer : /C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert High Assurance EV Root CA Serial : 03F1B4E15F3A82F1149678B3D7D8475C ------------------ Cert #1: Subject: /businessCategory=Private Organization/jurisdictionC=US/jurisdictionST=Washington/serialNumber=39070/street=#203/street=80 S Washington St/postalCode=98104/C=US/ST=Washington/L=Seattle/O=The Tor Project, Inc./CN=The Tor Project, Inc. Issuer : /C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert EV Code Signing CA (SHA2) Serial : 0F622EF31D0F1EF94E520DBD7A43E58C ------------------ Cert #2: Subject: /C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert Assured ID CA-1 Issuer : /C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert Assured ID Root CA Serial : 06FDF9039603ADEA000AEB3F27BBBA1B ------------------ Cert #3: Subject: /C=US/O=DigiCert/CN=DigiCert Timestamp Responder Issuer : /C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert Assured ID CA-1 Serial : 03019A023AFF58B16BD6D5EAE617F066
Now, with RFC 3161 Timestamping (using any hashing algorithm, but in this case using SHA-256), osslsigncode verify only prints the code signing certificates (as gk described). This makes sense, because the RFC 2161 timestamp is appended onto the pkcs7 structure embedded in the PE file, and timestamping does not result in a new and independent cert chain.
Signature verification: okNumber of signers: 1 Signer #0: Subject: /businessCategory=Private Organization/jurisdictionC=US/jurisdictionST=Washington/serialNumber=39070/street=#203/street=80 S Washington St/postalCode=98104/C=US/ST=Washington/L=Seattle/O=The Tor Project, Inc./CN=The Tor Project, Inc. Issuer : /C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert EV Code Signing CA (SHA2) Serial : 0F622EF31D0F1EF94E520DBD7A43E58CNumber of certificates: 2 Cert #0: Subject: /C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert EV Code Signing CA (SHA2) Issuer : /C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert High Assurance EV Root CA Serial : 03F1B4E15F3A82F1149678B3D7D8475C ------------------ Cert #1: Subject: /businessCategory=Private Organization/jurisdictionC=US/jurisdictionST=Washington/serialNumber=39070/street=#203/street=80 S Washington St/postalCode=98104/C=US/ST=Washington/L=Seattle/O=The Tor Project, Inc./CN=The Tor Project, Inc. Issuer : /C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert EV Code Signing CA (SHA2) Serial : 0F622EF31D0F1EF94E520DBD7A43E58CSucceeded
Using openssl pkcs7, as gk described, we can see the asn.1 object appended within the unauthenticated portion. First, we must extract the signatures from the file, then we can parse the resulting pkcs7 object: