[Date Prev][Date Next]
(ITS#7002) Patch - Mozilla NSS - if client cert is bad, VerifyCert allow should warn and try should fail
- To: openldap-its@OpenLDAP.org
- Subject: (ITS#7002) Patch - Mozilla NSS - if client cert is bad, VerifyCert allow should warn and try should fail
- From: firstname.lastname@example.org
- Date: Tue, 26 Jul 2011 03:08:26 GMT
- Auto-submitted: auto-generated (OpenLDAP-ITS)
Full_Name: Rich Megginson
Version: 2.4.26 (tip of git OPENLDAP_REL_ENG_2_4)
Submission from: (NULL) (22.214.171.124)
If the olcTLSVerifyClient is set to a value other than "never", the server
should request that the client send a client certificate for possible use with
client cert auth (e.g. SASL/EXTERNAL).
If set to "allow", if the client sends a cert, and there are problems with it,
the server will warn about problems, but will allow the SSL session to proceed
without a client cert.
If set to "try", if the client sends a cert, and there are problems with it, the
server will warn about those problems, and shutdown the SSL session.
If set to "demand" or "hard", the client must send a cert, and the server will
shutdown the SSL session if there are problems.
I added a new member of the tlsm context structure - tc_warn_only - if this is
set, tlsm_verify_cert will only warn about errors, and only if TRACE level debug
is set. This allows the server to warn but allow bad certs if "allow" is set,
and warn and fail if "try" is set.
Note: The patch applies on top of ITS#7001 - you cannot apply this patch first,
then the patch to 7001