[gnutls-devel] Unable to trust server certificate instead of issueing CA
Daniel Kahn Gillmor
dkg at fifthhorseman.net
Wed Dec 3 21:26:09 CET 2014
On 12/03/2014 02:01 PM, Andreas Metzler wrote:
> This came up on d-d
> With gnutls 3.3.* it seems to be impossible to trust server
> certificate instead of the signing authority:
> ametzler at argenau:~$ gnutls-cli --x509cafile=/tmp/GNUTLS/buildd.debian.org.pem buildd.debian.org
> This used to work in 2.x. Is this an intentional change?
This seems like it might be a slight shift in semantics of --x509cafile
(and probably of gnutls_certificate_set_x509_trust_file() behind it).
* If any cert in the peer's chain is found in x509cafile, the chain is
* If any CA cert in the peer's chain is found in the x509cafile, the
chain is valid.
Arguably, these are different goals, and you might want to separate out
the "I think my peer has one of these keys" scenario from the "i think
my peer's id is certified by one of these keys" scenario for better
The --tofu and --strict-tofu option to gnutls-cli can be used to help
answer "i think my peer has one of these keys".
But if this is going to be a deliberate behavior shift, it probably
needs explicit documentation. We might also want a runtime warning if
any of the loaded certs had CA:False or were otherwise incapable of
acting as a CA.
But ultimately, i'm not sure that we should break the API semantics in
this way even if the explicitly-split semantics would be cleaner; the
non-split semantics are a fairly well-established use pattern.
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 949 bytes
Desc: OpenPGP digital signature
More information about the Gnutls-devel