Hi again.

The following is my own opinion, and does not reflect an upstream
consensus.

On Thu, 14 Nov 2013 18:40:30 +0100
Roland Koebler <r.koeb...@yahoo.de> wrote:

> Hi,
> 
> > This is a loop.
> yes and no: It's not exactly a loop, since the two certificates belong
> to certificate-chains of two different certificates, in this case:
> 
> Cert1                         signed by PositiveSSL CA 2
> PositiveSSL CA 2              signed by AddTrust External CA Root
> AddTrust External CA Root     signed by UTN - DATACorp SGC
> 
> Cert2                         signed by EssentialSSL CA
> EssentialSSL CA                       signed by COMODO Certification
> Authority COMODO Certification Authority      signed by UTN -
> DATACorp SGC UTN - DATACorp SGC               signed by AddTrust
> External CA Root
> 
> 
> And I don't see why it should be a problem when e.g. two authorities
> sign each others certificates. So, even
> 
> Cert1 <- A <- B
> Cert2 <- B <- A
> 
> shouldn't cause *any* problem.

I see now what you're using it for. I still think this is wrong, but I
also can understand you don't want to change it for compat reasons.

> If this makes SSL of lighttpd break, it's a serious lighttpd-bug.

If there would be an easy and good way of fixing it, I would have done
it. Sadly openssl is a f*** piece of shit, and I decided that I wasted
enough time with it.
(I also disagree with the attribute "serious".)

> (By the way: Why does lighttpd even detect such loops? The
> lighttpd-config- file *exactly* defines ca-files for every
> SNI-domain, which lighttpd should simply send to the client. I don't
> see why lighttpd wants to be "smart" and analyzes these ca-files...)

lighttpd doesn't give a shit about your ca-files. I just hands them over
to openssl. Though with the new patch *all* your ca-files end up in the
same SSL_CTX, which openssl cannot handle (although you can blame
openssl for the stupid API itself, at this stage this can't be fixed;
there is no way to decide which certificates to pick from the merged
ca-lists).

If you want to understand the inner workings of all this, read the
code. If you want to live a happy life, don't.


I still hold to the argument that CA loops are wrong. Cross-signing CA
in *one* direction is ok, but both ways is just wrong.
Pick one (or more) CAs to be at the top, and use cross-signed certs up
to it.


Perhaps someone comes up with a patch fixing your problem. Perhaps it
even gets fixed upstream. But I'm done with openssl - sorry for this.

regards,
Stefan


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to