Uploaded image for project: 'radsecproxy'
  1. radsecproxy
  2. RADSECPROXY-44

Verify client cert chains using the proper CA

This issue belongs to an archived project. You can view it, but you can't modify it. Learn more

XMLWordPrintable

    • Icon: Bug Bug
    • Resolution: Unresolved
    • Icon: Major Major
    • radsecproxy-1.8
    • None
    • code
    • None

      The fix in RADSECPROXY-43 makes radsecproxy not consider client blocks with a different 'tls' setting than the first matching one.

      We should fix this, possibly by

      i) sending the server certs from _all_ 'tls' blocks in a TLS Certificate Request (RFC 5246 sect. 7.4.4.) and
      ii) re-verify the chain of client certs after verifying their content (X509_verify_cert()?)

            linus Linus Nordberg
            linus Linus Nordberg
            Archiver:
            kleist Josva Kleist

              Created:
              Updated:
              Archived: