Re: Choice of CAs in SSL/TLS handshake

2006-03-09 Thread Peter Sylvester
I think you are right about the current behaviour When filling up the intermediate stack, the x609 verify cert break when the verifydepth is reached as far as I see from the code, but it seems that the ssl library doesn't set a verify depth? But in this case the verifydepth would work I

Re: Choice of CAs in SSL/TLS handshake

2006-03-08 Thread Nicolas Margaine
On 3/7/06, Olaf Gellert [EMAIL PROTECTED] wrote: Samy Thiyagarajan wrote: Hi, May be changing the verification of the depth level solve this issue. ( I mean check the chain only upto User CA 1 and not upto the Root CA ) In this case it should not report about missing valid root. Im

Re: Choice of CAs in SSL/TLS handshake

2006-03-08 Thread Dr. Stephen Henson
On Tue, Mar 07, 2006, Olaf Gellert wrote: Samy Thiyagarajan wrote: Hi, May be changing the verification of the depth level solve this issue. ( I mean check the chain only upto User CA 1 and not upto the Root CA ) In this case it should not report about missing valid root. Im not

Re: Choice of CAs in SSL/TLS handshake

2006-03-08 Thread Peter Sylvester
Another easy way is to use self signed certs of the acceptable CAs. Dr. Stephen Henson wrote: On Tue, Mar 07, 2006, Olaf Gellert wrote: Samy Thiyagarajan wrote: Hi, May be changing the verification of the depth level solve this issue. ( I mean check the chain only upto User CA 1 and

Re: Choice of CAs in SSL/TLS handshake

2006-03-08 Thread Dr. Stephen Henson
On Wed, Mar 08, 2006, Peter Sylvester wrote: Another easy way is to use self signed certs of the acceptable CAs. I'm not sure that would work because the path building algorithm first tries to construct as much of the path as possible from the set of unstrusted CAs with the exception of the

Re: Choice of CAs in SSL/TLS handshake

2006-03-08 Thread Peter Sylvester
Dr. Stephen Henson wrote: On Wed, Mar 08, 2006, Peter Sylvester wrote: Another easy way is to use self signed certs of the acceptable CAs. I'm not sure that would work because the path building algorithm first tries to construct as much of the path as possible from the set of

Re: Choice of CAs in SSL/TLS handshake

2006-03-08 Thread Dr. Stephen Henson
On Wed, Mar 08, 2006, Peter Sylvester wrote: Dr. Stephen Henson wrote: On Wed, Mar 08, 2006, Peter Sylvester wrote: Another easy way is to use self signed certs of the acceptable CAs. I'm not sure that would work because the path building algorithm first tries to construct

Choice of CAs in SSL/TLS handshake

2006-03-07 Thread Olaf Gellert
Hi, I came across the following problem: I do have two user CAs under the same root CA: Root CA |- User CA 1 - User Certificate 1 |- User CA 2 - User Certificate 2 I want to tell a webserver to accept certificates from User CA 1 but not from User CA 2. But: In openssl s_server AND

RE: Choice of CAs in SSL/TLS handshake

2006-03-07 Thread Gayathri Sundar
To: openssl-users@openssl.org Subject: Choice of CAs in SSL/TLS handshake Hi, I came across the following problem: I do have two user CAs under the same root CA: Root CA |- User CA 1 - User Certificate 1 |- User CA 2 - User Certificate 2 I want to tell a webserver to accept

Re: Choice of CAs in SSL/TLS handshake

2006-03-07 Thread Olaf Gellert
Gayathri Sundar wrote: you can put CA2 as part of the revocation list? if CA2 is part of the client's CRL, then it will automatically be rejected..is this what you want? Nothing about revocation, both CAs are valid and should stay valid. I do have a User CA 1 for one type of service (or one

Re: Choice of CAs in SSL/TLS handshake

2006-03-07 Thread Samy Thiyagarajan
] Sent by: [EMAIL PROTECTED] 07.03.2006 12:56 Please respond to openssl-users@openssl.org To openssl-users@openssl.org cc Subject Choice of CAs in SSL/TLS handshake Classification Hi, I came across the following problem: I do have two user CAs under the same root CA: Root

Re: Choice of CAs in SSL/TLS handshake

2006-03-07 Thread Olaf Gellert
Samy Thiyagarajan wrote: Hi, May be changing the verification of the depth level solve this issue. ( I mean check the chain only upto User CA 1 and not upto the Root CA ) In this case it should not report about missing valid root. Im not sure. this is just an idea. Good idea. But

Re: Choice of CAs in SSL/TLS handshake

2006-03-07 Thread Randy Turner
When you want to operate in this special CA filtering mode, you could hook the OpenSSL certificate validation logic. Your callback could then implement it's only validation logic and return a reject when you see a certificate you want to deny (even though it's valid). Randy On Mar 7,

RE: Choice of CAs in SSL/TLS handshake

2006-03-07 Thread Gayathri Sundar
: Choice of CAs in SSL/TLS handshake Samy Thiyagarajan wrote: Hi, May be changing the verification of the depth level solve this issue. ( I mean check the chain only upto User CA 1 and not upto the Root CA ) In this case it should not report about missing valid root. Im not sure