-
Notifications
You must be signed in to change notification settings - Fork 530
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Improve the Client Certificate Logic #2419
Conversation
Going through the OpenSSL certificate validation, I think it already does all the above desired things. |
Locally, on a Linux machine, with this change, one of our tests fails ( But based on the comment:
I assume this will get resolved eventually. I'm only mentioning it in case this really is an unexpected error. cc @wfurt |
@anrossi I don't believe this is expected. Please address and make sure we have a test case to cover this apparent gap in our coverage. |
@ManickaP does the test validate the chain sent from the server, or sent from the client? Is the |
The chain should be symmetric e.g. when endpoint sends certificate, it should send intermediates without root. The test @ManickaP mentioned does verify server's chain e.g. there is no client cert. |
Sent from the server, client blows up.
Yes, we're using it. BTW, on the client we're setting these flags: The test code is here: |
No idea. If you want me to test it, I'll have to set up Win machine since I don't have one 😄 I can do it, but it'll take time.
If you mean |
I can probably try both. Since our goal is SslStream parity I'm probably at best position to do the testing. |
Thanks @wfurt. We appreciate it. |
Only Schannel complete. OpenSSL next.