#3916: Mutt 1.8: TOFU host certificate not working
-----------------------+----------------------
Reporter: kratem32 | Owner: mutt-dev
Type: defect | Status: new
Priority: major | Milestone: 1.8
Component: crypto | Version:
Resolution: | Keywords: tofu
-----------------------+----------------------
Comment (by m-a):
Replying to [comment:8 kevin8t8]:
> I wonder if the "error:0906D06C:PEM routines:PEM_read_bio:no start line"
is a remnant from ssl_load_certificates() trying to read an empty cert
file. Perhaps we need to reset the err on rejecting.
No, there's a place that should have looked at and purged the error queue,
but forgot.
> The new behavior is the default behavior using OpenSSL verification.
This is definitely a change in behavior, but I'm not convinced it's a bug.
It's not clear to me that it's worth preserving the previous behavior of
being able to reject a piece in the chain and continue. Matthias and
MichaĆ I'd appreciate your opinion though.
I don't see it as a bug either, but rather a missing special feature. I
acknowledge there is a point in providing **some** way for users to
restrict what they want to trust, by cutting chains, but I wonder if we
need to expose it through mutt's user interface. Ultimately users claim
to improve security by avoiding rogue or dodgy CAs, but I question that
TOFU is any better. If you see a certificate change, is that because (a)
an eavesdropping has started, (b) an eavesdropping has ended, or (c)
someone just reissued the host's certificate - which will be rather
frequent if it's a Let's Encrypt certificate, or behind certain load
balancing setups. This looks like self-inflicted pain somewhat. If we
add something to the UI, it should be a "skip trusting this certificate".
--
Ticket URL: <https://dev.mutt.org/trac/ticket/3916#comment:10>
Mutt <http://www.mutt.org/>
The Mutt mail user agent