-
Notifications
You must be signed in to change notification settings - Fork 578
Fallback to System Certificate Store when CA Certificate Path Is Not Present #991
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
| return false; | ||
| } | ||
|
|
||
| // If CA Certificate is specified then validate against the CA certificate, otherwise it is validated against the installed certificates |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Notable that this comment SAYS it validates against installed certificates but that is actually not true. It validates against installed certificates if it is a HTTPS/TLS connection, which was probably the intended meaning. If you specify a certificate but not a CA, it just fails. In the case of #990, you can specify a certificate from a Public CA but then validation fails and because many CAs use a lineage of certificates you cannot validate the chain with the existing configuration options.
|
I do see a potential issue here where it doubles up the certificate chain validation for TLS/HTTPS connections because the function |
|
@dckorben yes it works now if I don't specify CA certificate and it checks it agains the installed ones. |
|
Are you a Linux test by chance? |
The good aspect of this is you won't have to manage the CA key expirations manually. So, it's an improvement in function as well. |
|
nope, windows |
"Fixes" #990
This isn't final, too duplicative. Need someone to verify it works on Windows/Linux as we've been bitten by behavior differences before and I don't have an admin box I can trust the generated CA with.
@dimaaik27 Please verify this works in your implementation before I clean up the code.