Changes between Version 1 and Version 2 of Ticket #386, comment 2


Ignore:
Timestamp:
04/14/14 16:40:34 (10 years ago)
Author:
tlhackque
Comment:

Legend:

Unmodified
Added
Removed
Modified
  • Ticket #386, comment 2

    v1 v2  
    8686
    8787----
    88 Given all this, you can see that this is quite hard to document.  I'm actually rather surprised that this API was chosen by OpenVPN, rather than doing something that produces an exact match on DN, requires that the cert be in the validity period, requires that the cert has reasonable attributes (e.g. meets the 'purpose' test for webserver (client) validation, etc)  There are other APIs documented for the certificate store, but they do require more work.
     88Given all this, you can see that this is quite hard to document.  I'm actually rather surprised that this API was chosen by OpenVPN, rather than doing something that produces an exact match on DN, requires that the cert be in the validity period, requires that the cert has reasonable attributes (e.g. meets the 'purpose' test for webserver (client) validation, etc)  There are other APIs documented for the certificate store, but they do require more work.  Also, OpenVPN really should only tell the search to only consider certificates from the "acceptable CA" list published by the server - which, since OpenVPN doesn't have a separate list, is the '''--ca''' / '''--capath''' list.  (For the preferred server behavior, see Apache HTTPD's '''SSLCADNRequestFile''' and '''SSLCADNRequestPath''' directives at http://httpd.apache.org/docs/current/mod/mod_ssl.html#SSLCADNRequestFile.  Analogously, OpenVPN should have '''--Acceptable-ca''' and '''--Acceptable-capath''' options for the server.)
    8989
    9090But for now, it is what it is.  And we should at least explain how it works  until something better comes along.