Check certificate extensions in trusted certificates.
authorbeck <beck@openbsd.org>
Sun, 13 Nov 2022 18:37:32 +0000 (18:37 +0000)
committerbeck <beck@openbsd.org>
Sun, 13 Nov 2022 18:37:32 +0000 (18:37 +0000)
commitb1a013323207f80d59a40ac3b19b1f6f94b63931
tree8818a0b100107221a5be33dd1cf90c475070754b
parent0b49f4e199b32fa9998095c3106fbb10e94b9ab3
Check certificate extensions in trusted certificates.

Historically the standards let the implementation decide to
either check or ignore the certificate properties of trust anchors.
You could either use them simply as a source of a public key which
was trusted for everything, or you were also permitted to check the
certificate properties and fully enforce them. Hooray for freedumb.

OpenSSL changed to checking these with :
commit 0daccd4dc1f1ac62181738a91714f35472e50f3c
Author: Viktor Dukhovni <openssl-users@dukhovni.org>
Date:   Thu Jan 28 03:01:45 2016 -0500

BoringSSL currently does not check them, as it also inherited
the previous OpenSSL behaviour. It will change to check them in
the future.
(https://bugs.chromium.org/p/boringssl/issues/detail?id=533)
lib/libcrypto/x509/x509_internal.h
lib/libcrypto/x509/x509_trs.c
lib/libcrypto/x509/x509_vfy.c