[openssl-dev] [openssl.org #3621] Support legacy CA removal, ignore unnecessary intermediate CAs in SSL/TLS handshake by default

2015-05-29 Thread Matt Caswell via RT
On Fri May 29 05:40:51 2015, raysat...@yahoo.com wrote: > On 5/27/2015 4:21 AM, Matt Caswell via RT wrote: > > On Wed May 27 06:41:51 2015, raysat...@yahoo.com wrote: > >> On 3/16/2015 5:45 AM, Kai Engert via RT wrote: > >>> Thank you very much for your work on this issue! > >>> In my testing so fa

Re: [openssl-dev] [openssl.org #3621] Support legacy CA removal, ignore unnecessary intermediate CAs in SSL/TLS handshake by default

2015-05-28 Thread Ray Satiro via RT
On 5/27/2015 4:21 AM, Matt Caswell via RT wrote: > On Wed May 27 06:41:51 2015, raysat...@yahoo.com wrote: >> On 3/16/2015 5:45 AM, Kai Engert via RT wrote: >>> Thank you very much for your work on this issue! >>> In my testing so far, it works as requested. >>> >>> I noticed the code changes in x5

Re: [openssl-dev] [openssl.org #3621] Support legacy CA removal, ignore unnecessary intermediate CAs in SSL/TLS handshake by default

2015-05-28 Thread Ray Satiro
On 5/27/2015 4:21 AM, Matt Caswell via RT wrote: On Wed May 27 06:41:51 2015, raysat...@yahoo.com wrote: On 3/16/2015 5:45 AM, Kai Engert via RT wrote: Thank you very much for your work on this issue! In my testing so far, it works as requested. I noticed the code changes in x509_vfy.c apply f

[openssl-dev] [openssl.org #3621] Support legacy CA removal, ignore unnecessary intermediate CAs in SSL/TLS handshake by default

2015-05-27 Thread Matt Caswell via RT
On Wed May 27 06:41:51 2015, raysat...@yahoo.com wrote: > On 3/16/2015 5:45 AM, Kai Engert via RT wrote: > > Thank you very much for your work on this issue! > > In my testing so far, it works as requested. > > > > I noticed the code changes in x509_vfy.c apply fine on top of the 1.0.2 > > stable b

Re: [openssl-dev] [openssl.org #3621] Support legacy CA removal, ignore unnecessary intermediate CAs in SSL/TLS handshake by default

2015-05-26 Thread Ray Satiro via RT
On 3/16/2015 5:45 AM, Kai Engert via RT wrote: > Thank you very much for your work on this issue! > In my testing so far, it works as requested. > > I noticed the code changes in x509_vfy.c apply fine on top of the 1.0.2 > stable branch, and the test suite succeeeds. > > Will you consider to add th

Re: [openssl-dev] [openssl.org #3621] Support legacy CA removal, ignore unnecessary intermediate CAs in SSL/TLS handshake by default

2015-05-26 Thread Ray Satiro
On 3/16/2015 5:45 AM, Kai Engert via RT wrote: Thank you very much for your work on this issue! In my testing so far, it works as requested. I noticed the code changes in x509_vfy.c apply fine on top of the 1.0.2 stable branch, and the test suite succeeeds. Will you consider to add this enhance

Re: [openssl-dev] [openssl.org #3621] Support legacy CA removal, ignore unnecessary intermediate CAs in SSL/TLS handshake by default

2015-03-16 Thread Matt Caswell
On 16/03/15 09:45, Kai Engert via RT wrote: > Thank you very much for your work on this issue! > In my testing so far, it works as requested. > > I noticed the code changes in x509_vfy.c apply fine on top of the 1.0.2 > stable branch, and the test suite succeeeds. > > Will you consider to add t

Re: [openssl-dev] [openssl.org #3621] Support legacy CA removal, ignore unnecessary intermediate CAs in SSL/TLS handshake by default

2015-03-16 Thread Kai Engert via RT
Thank you very much for your work on this issue! In my testing so far, it works as requested. I noticed the code changes in x509_vfy.c apply fine on top of the 1.0.2 stable branch, and the test suite succeeeds. Will you consider to add this enhancement in a feature release on the 1.0.2 branch? R

[openssl-dev] [openssl.org #3621] Support legacy CA removal, ignore unnecessary intermediate CAs in SSL/TLS handshake by default

2015-02-25 Thread Matt Caswell via RT
Please see the following commits to master in relation to this issue: da084a5ec6 15dba5be6a 25690b7f5f fa7b01115b The behaviour is now that openssl will attempt to build a trust chain as it did previously. If that fails, it will then look to see if there is an alternative chain that can be constr

Re: [openssl-dev] [openssl.org #3621] Support legacy CA removal, ignore unnecessary intermediate CAs in SSL/TLS handshake by default

2014-12-29 Thread Viktor Dukhovni
On Tue, Dec 16, 2014 at 03:02:22PM +0100, Hubert Kario wrote: > > DANE TLSA PKIX-TA(0) records can designate the digest of a trust > > anchor selected by the server operator. When TLS server transmits > > a corresponding certificate chain it may not be safe to replace > > that chain with a shorte

Re: [openssl-dev] [openssl.org #3621] Support legacy CA removal, ignore unnecessary intermediate CAs in SSL/TLS handshake by default

2014-12-29 Thread Yuhong Bao via RT
As a warning, the Equifax root expires in August 2018 and hopefully will removed from Mozilla soon. Right now GeoTrust is still promoting the use of their GeoTrust to Equifax cross-certificate, and they do issue four year certificates.

Re: [openssl-dev] [openssl.org #3621] Support legacy CA removal, ignore unnecessary intermediate CAs in SSL/TLS handshake by default

2014-12-16 Thread Hubert Kario
On Monday 15 December 2014 16:32:42 Viktor Dukhovni wrote: > On Mon, Dec 15, 2014 at 05:24:03PM +0100, Tomas Mraz wrote: > > > This can break DANE TLSA verification, because the site's designated > > > trust anchor might no longer be in the shorter constructed chain. > > > > > > [Postfix not affec

Re: [openssl-dev] [openssl.org #3621] Support legacy CA removal, ignore unnecessary intermediate CAs in SSL/TLS handshake by default

2014-12-15 Thread Viktor Dukhovni
On Mon, Dec 15, 2014 at 05:24:03PM +0100, Tomas Mraz wrote: > > This can break DANE TLSA verification, because the site's designated > > trust anchor might no longer be in the shorter constructed chain. > > > > [Postfix not affected] > > Please enlighten me how this case could be broken by this ch

Re: [openssl-dev] [openssl.org #3621] Support legacy CA removal, ignore unnecessary intermediate CAs in SSL/TLS handshake by default

2014-12-15 Thread Tomas Mraz
On Po, 2014-12-15 at 14:48 +, Viktor Dukhovni wrote: > On Mon, Dec 15, 2014 at 09:23:26AM -0500, Salz, Rich wrote: > > > > For what it's worth, I have tested the Alexa top 1 million servers with > > > the - > > > trusted_first option and haven't found a single server that looses its > > > tr

Re: [openssl-dev] [openssl.org #3621] Support legacy CA removal, ignore unnecessary intermediate CAs in SSL/TLS handshake by default

2014-12-15 Thread Viktor Dukhovni
On Mon, Dec 15, 2014 at 09:23:26AM -0500, Salz, Rich wrote: > > For what it's worth, I have tested the Alexa top 1 million servers with the > > - > > trusted_first option and haven't found a single server that looses its > > trusted > > status, on the other hand, good few percent of servers do g

Re: [openssl-dev] [openssl.org #3621] Support legacy CA removal, ignore unnecessary intermediate CAs in SSL/TLS handshake by default

2014-12-15 Thread Salz, Rich via RT
> For what it's worth, I have tested the Alexa top 1 million servers with the - > trusted_first option and haven't found a single server that looses its trusted > status, on the other hand, good few percent of servers do gain it. It's worth a great deal. Thanks! I love fact-based analysis. :)

Re: [openssl-dev] [openssl.org #3621] Support legacy CA removal, ignore unnecessary intermediate CAs in SSL/TLS handshake by default

2014-12-15 Thread Salz, Rich
> For what it's worth, I have tested the Alexa top 1 million servers with the - > trusted_first option and haven't found a single server that looses its trusted > status, on the other hand, good few percent of servers do gain it. It's worth a great deal. Thanks! I love fact-based analysis. :) _

Re: [openssl-dev] [openssl.org #3621] Support legacy CA removal, ignore unnecessary intermediate CAs in SSL/TLS handshake by default

2014-12-15 Thread Hubert Kario via RT
On Friday 05 December 2014 15:18:30 you wrote: > When discussing this issue, my colleague Hubert Kario made me aware of a > flag offered by e.g. the openssl s_client utility: "-trusted_first". > When using -trusted_first, the server verification works successfully in > the above scenario. > > Give