#3916: Mutt 1.8: TOFU host certificate not working
-----------------------+----------------------
  Reporter:  kratem32  |      Owner:  mutt-dev
      Type:  defect    |     Status:  new
  Priority:  major     |  Milestone:  1.8
 Component:  crypto    |    Version:
Resolution:            |   Keywords:  tofu
-----------------------+----------------------

Comment (by m-a):

 What you call "should not do that" is the normal OpenSSL behaviour, and
 you're just used to mutt's older custom behaviour, because OpenSSL assumes
 if a certificate closer to the root fails verification, the entire chain
 is invalid.

 If, OTOH you accept the root once, it is trusted and since the signatures
 themselves are valid, the entire chain is considered verified OK.

 In order to get the old behaviour back, mutt would have to add and track a
 "please confirm every certificate" marker through the multiple calls to
 ssl_verify_callback(), and in this mode it would have to behave as though
 preverify_ok were 0 (so as to present the cerficiate) but still return 1
 from ssl_verify_callback() except when someone rejects the host
 certificate.

--
Ticket URL: <https://dev.mutt.org/trac/ticket/3916#comment:7>
Mutt <http://www.mutt.org/>
The Mutt mail user agent

Reply via email to