Re: [HACKERS] Trust intermediate CA for client certificates

2013-12-02 Thread Ian Pilcher
low connections when the client presents a certificate signed by a particular intermediate CA? AFAIK, there is currently no way to do this. -- ======== Ian Pilcher arequip...@gmail.com

Re: [HACKERS] Trust intermediate CA for client certificates

2013-12-02 Thread Ian Pilcher
On 12/02/2013 02:32 PM, Tom Lane wrote: > Ian Pilcher writes: >> I'm not sure what you're asking. The desired behavior (IMO) would be to >> accept client certificates signed by some intermediate CAs without >> accepting any client certificate that can present a ch

Re: [HACKERS] Trust intermediate CA for client certificates

2013-12-02 Thread Ian Pilcher
n that currently surrounds the issue. -- ======== Ian Pilcher arequip...@gmail.com Sent from the cloud -- where it's already tomorrow -- Sent via pgsql-hackers maili

Re: [HACKERS] Trust intermediate CA for client certificates

2013-12-02 Thread Ian Pilcher
On 12/02/2013 02:17 PM, Tom Lane wrote: > Ian Pilcher writes: >> Yes. And the problem is that there is no way to prevent OpenSSL from >> accepting intermediate certificates supplied by the client. As a >> result, the server cannot accept client certificates signed by o

Re: [HACKERS] Trust intermediate CA for client certificates

2013-12-02 Thread Ian Pilcher
TLS for the win? -- ============ Ian Pilcher arequip...@gmail.com Sent from the cloud -- where it's already tomorrow -- Sent via pgsql-hackers mailing list (pgsql-hackers@postgresql.org

Re: [HACKERS] Trust intermediate CA for client certificates

2013-03-18 Thread Ian Pilcher
is configuration, the test client is able to connect with the "good" client certificate, but it is also able to connect with the "bad" client certificate when it presents a certificate chain that includes the server CA certificate. -- ========

Re: [HACKERS] Trust intermediate CA for client certificates

2013-03-17 Thread Ian Pilcher
enSSL discover it that way, but it looks like > OpenSSL won't use certs it's seen in server.crt when verifying client > cert trust paths. Nope. It's pretty obvious from be-secure.c that only the certificates in root.crt will be used. --

Re: [HACKERS] Trust intermediate CA for client certificates

2013-03-09 Thread Ian Pilcher
validates certificates, I do not believe that there is any way of achieving the desired behavior with the current codebase. Adding pgsql-hackers to see if there is any interest in a patch to add this functionality. -- Ian Pil