Andreas Metzler <[email protected]> writes:

> On 2009-02-02 Simon Josefsson <[email protected]> wrote:
>> Joachim Breitner <[email protected]> writes:
>>> Am Montag, den 02.02.2009, 15:40 +0100 schrieb Simon Josefsson:
>>>>> Package: libgnutls26
>>>>> Version: 2.4.2-5
>>>>> Severity: important
>
>>>>> Hi Andreas,
>>>>> with your recent upload of gnults, this signature of a host with a
>>>>> recently generated cacert signature is no longer valid:
>
>>>>> $ gnutls-cli -VV fry.serverama.de -p 443 --x509cafile 
>>>>> /etc/ssl/certs/ca-certificates.crt 
>>>> ...
>>>>> - Peer's certificate is NOT trusted
>
>>>> CACert's intermediate certificate is signed using RSA-MD5, so it won't
>>>> pass GnuTLS chain verification logic.
> [...]
>>>> We should probably consider to back-port Donald's logic to short-circuit
>>>> chain verification as soon as you have a trusted cert: then you could
>>>> chose to trust CACerts intermediate cert, and then there is no need to
>>>> rely on RSA-MD5 to trust this chain.  I'll test if the patch would help
>>>> in your situation.
>
>
> Hello,
>
> I have just uploaded 2.4.2-6 (which is basically 2.4.3 without all the
> changes from autogenerated files for easier review.) to unstable. This
> should fix (workaround) your problem, since it makes t possible to
> trust the intermediate cert.

Thanks.  I can confirm that it solves the problem:

j...@mocca:~$ LD_PRELOAD=/usr/lib/libgnutls.so /usr/bin/gnutls-cli -VV 
fry.serverama.de -p 443 --x509cafile 
/usr/share/ca-certificates/cacert.org/root.crt 
...
- Peer's certificate is NOT trusted

Which is correct since the chain contains a RSA-MD5 signature.  (The
better error message is not printed here though, that change was not
back-ported.)

Trying it again with the intermediate cert works fine:

j...@mocca:~$ LD_PRELOAD=/usr/lib/libgnutls.so /usr/bin/gnutls-cli -VV 
fry.serverama.de -p 443 --x509cafile 
/usr/share/ca-certificates/cacert.org/class3.crt 
...
- Peer's certificate is trusted

So I think everything works as expected now.

So, shouldn't this bug be marked as fixed with 2.4.2-6?

/Simon



-- 
To UNSUBSCRIBE, email to [email protected]
with a subject of "unsubscribe". Trouble? Contact [email protected]

Reply via email to