You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The option to validate the TLS peer solely based on an X.509 certificate chain (caCert) is not supported in librelp.
The current logic is:
Verify the peer certificate against the configured caCert (gnutls_certificate_verify_peers2 does it) and
Verify the peer certificate against the configured permittedPeer
I propose the logic to be:
Verify the peer certificate against the configured caCert (gnutls_certificate_verify_peers2 does it) andif caCert unset or permittedPeer > 0, then
Verify the peer certificate against the configured permittedPeer
This logic should not break backwards compatibility, since it has not been supported to have permittedPeer option unset so far (or well, it would always have led to failed peer verification).
Browsed the code some more. I see now that you never intended to use caCert as a trust chain for the peer, only as the ca bundle containing the trust chain for the local instance.
Yet my feature request remains. Implementation wise it should be a new configuration parameter for tls, instead of assuming caCert also being the trust chain for the peer.
Hi,
The option to validate the TLS peer solely based on an X.509 certificate chain (caCert) is not supported in librelp.
The current logic is:
and
I propose the logic to be:
and if caCert unset or permittedPeer > 0, then
This logic should not break backwards compatibility, since it has not been supported to have permittedPeer option unset so far (or well, it would always have led to failed peer verification).
Main change would go around here:
librelp/src/tcp.c
Line 1190 in 63eebbb
I can work on a pull request if you agree on the changes in general.
Thanks,
: Mathias
The text was updated successfully, but these errors were encountered: