Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Cert validation changes in the latest NSS #4830

Merged
merged 2 commits into from
Aug 21, 2024
Merged

Conversation

edewata
Copy link
Contributor

@edewata edewata commented Aug 21, 2024

Previously if a client tries to connect to a server but it does not have the CA signing cert installed and trusted it will get an UNTRUSTED_ISSUER error from NSS and the cert approval callback will ask the user whether to trust the cert. In the latest NSS the error has changed to UNKNOWN_ISSUER, so the callback has been updated to handle the error in the same way. The tests have also been updated accordingly.

The latest NSS also requires the client to have the full cert chain in order to validate a cert, so most of the sub CA tests have been updated to install the sub CA signing cert in addition to the root CA signing cert. For some reason the sub CA tests with HSM still work without these changes. That will be investigated separately later.

Previously if a client tries to connect to a server but it does
not have the CA signing cert installed and trusted it will get an
UNTRUSTED_ISSUER error from NSS and the cert approval callback
will ask the user whether to trust the cert. In the latest NSS
the error has changed to UNKNOWN_ISSUER, so the callback has been
updated to handle the error in the same way. The tests have also
been updated accordingly.
The latest NSS requires the client to have the full cert chain
in order to validate a cert, so most of the sub CA tests have
been updated to install the sub CA signing cert in addition to
the root CA signing cert. For some reason the sub CA tests with
HSM still work without these changes. That will be investigated
separately later.
@edewata edewata requested a review from fmarco76 August 21, 2024 01:04
Copy link

sonarcloud bot commented Aug 21, 2024

Copy link
Member

@fmarco76 fmarco76 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM.

Not sure if the problem with server chain is in NSS or in our code. Not a big issue but to be investigated or reported to NSS.

@edewata
Copy link
Contributor Author

edewata commented Aug 21, 2024

@fmarco76 Thanks!

@edewata edewata merged commit 458f1a8 into dogtagpki:master Aug 21, 2024
147 of 157 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants