Skip to content

Comments

fix descriptions of credentials and verification app options#11273

Closed
DDvO wants to merge 2 commits intoopenssl:masterfrom
siemens:fix_credential_option_doc
Closed

fix descriptions of credentials and verification app options#11273
DDvO wants to merge 2 commits intoopenssl:masterfrom
siemens:fix_credential_option_doc

Conversation

@DDvO
Copy link
Contributor

@DDvO DDvO commented Mar 6, 2020

Looking for a way to provide extra untrusted certs for chain building during TLS server cert verification
I found that for both s_client and s_server the documentation of the certificates given with the -cert_chain option attributes them as 'trusted' while in fact they are just untrusted additional certs to use for chain building.

On the other hand the documentation of most of the -chainCAfile, -chainCApath, -chainCAstore, -verifyCAfile, -verifyCApath, and -verifyCAstore options failed to make clear that all the certificates addressed by them are trusted.

When correcting this I found and fixed some mistakes in the file format options and their descriptions.

I've also slightly improved the description of the crl_download and nameopt options.

Moreover, the order of the description of these and related options was somewhat inconsistent, which is fixed as well in this PR.

@DDvO DDvO changed the title fix doc of s_client/server credentials and verifiation options fix doc of s_client/server credentials and verification options Mar 6, 2020
@DDvO
Copy link
Contributor Author

DDvO commented Mar 6, 2020

BTW, how can one provide untrusted certs to help verifying peer certs, to use in case a peer does not send (all of) its cert chain?

@DDvO DDvO force-pushed the fix_credential_option_doc branch from 1dc2913 to 1ba721a Compare March 7, 2020 11:24
@DDvO
Copy link
Contributor Author

DDvO commented Mar 7, 2020

It turns out that also the descriptions of verification options for the s_time, x509, crl, req, ts, and verify apps deserve some consistency improvements. Done as well.

@DDvO DDvO changed the title fix doc of s_client/server credentials and verification options fix descriptions of credentials and verification app options Mar 7, 2020
@DDvO
Copy link
Contributor Author

DDvO commented Mar 7, 2020

Thanks @beldmit for your very swift approval!

Do you know if/how one can provide untrusted certs to help verifying peer TLS certs, to use in case a peer does not send (all of) its cert chain?
I found this possibility only for the verify app and direct use of X509_STORE_CTX_init().

@beldmit
Copy link
Member

beldmit commented Mar 7, 2020

I don't know either :(
Not sure if it's a reasonable option because in real life (e. g. browsers) we don't have such a store so servers must include a full chain to avoid errors

@DDvO
Copy link
Contributor Author

DDvO commented Mar 7, 2020

I agree that for web scenarios pre-known untrusted peer certs make little sense,
but in managed (e.g., industrial) scenarios it can make much sense,
in particular with limited bandwidth where it would be nice to avoid sending the same untrusted certs over and over.

@richsalz
Copy link
Contributor

richsalz commented Mar 7, 2020

@DDvO
Copy link
Contributor Author

DDvO commented Mar 7, 2020

Nice, but this just compresses the certs being transmitted, but does not stop sending them.
And transmission size is not the only potential reason why a TLS party may want/need to augment the cert chain it receives from a peer.

@DDvO DDvO force-pushed the fix_credential_option_doc branch from 1ba721a to faa048d Compare March 9, 2020 11:27
@DDvO
Copy link
Contributor Author

DDvO commented Mar 9, 2020

Rebased and partly squashed.
Given that the approval was done two days before, can I merge this PR right away?

@t8m
Copy link
Member

t8m commented Mar 9, 2020

It is missing OTC member approval.

@kaduk
Copy link
Contributor

kaduk commented Mar 10, 2020

Using extra certs for chain building can come into play when the server is sending a potentially valid chain but you want to use a different one, e.g., chaining up to a different or cross-signed root.

@DDvO
Copy link
Contributor Author

DDvO commented Mar 18, 2020

Ping for OTC approval

DDvO added 2 commits March 23, 2020 10:24
…apps

fix doc of s_client and s_server credentials and verification options
fix doc of verification options also for s_time, x509, crl, req, ts, and verify
correcting and extending texts regarding untrusted and trusted certs,
making the order of options in the docs and help texts more consistent,
etc.
@DDvO DDvO force-pushed the fix_credential_option_doc branch from faa048d to 5303a7d Compare March 23, 2020 09:26
@DDvO
Copy link
Contributor Author

DDvO commented Mar 23, 2020

Rebased this PR. It still needs an OTC member approval.

@DDvO
Copy link
Contributor Author

DDvO commented Mar 26, 2020

The review/approval by @jaym05700 does not count here.

@DDvO
Copy link
Contributor Author

DDvO commented Apr 6, 2020

Pinging again on a OTC member review+approval.

@paulidale paulidale added approval: done This pull request has the required number of approvals and removed approval: otc review pending labels Apr 6, 2020
@openssl-machine openssl-machine removed the approval: done This pull request has the required number of approvals label Apr 7, 2020
@openssl-machine
Copy link
Collaborator

This pull request is ready to merge

@openssl-machine openssl-machine added the approval: ready to merge The 24 hour grace period has passed, ready to merge label Apr 7, 2020
@DDvO
Copy link
Contributor Author

DDvO commented Apr 15, 2020

Merged - thanks!

@DDvO DDvO closed this Apr 15, 2020
openssl-machine pushed a commit that referenced this pull request Apr 20, 2020
…apps

fix doc of s_client and s_server credentials and verification options
fix doc of verification options also for s_time, x509, crl, req, ts, and verify
correcting and extending texts regarding untrusted and trusted certs,
making the order of options in the docs and help texts more consistent,
etc.

Reviewed-by: Dmitry Belyavskiy <[email protected]>
Reviewed-by: Matt Caswell <[email protected]>
(Merged from #11273)
openssl-machine pushed a commit that referenced this pull request Apr 20, 2020
…since #10667

Reviewed-by: Dmitry Belyavskiy <[email protected]>
Reviewed-by: Matt Caswell <[email protected]>
(Merged from #11273)
@DDvO
Copy link
Contributor Author

DDvO commented Apr 20, 2020

I just found that the merge did not really happen, likely due to some misspelling or the like.
Now it's actually merged.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approval: ready to merge The 24 hour grace period has passed, ready to merge branch: master Applies to master branch

Projects

None yet

Development

Successfully merging this pull request may close these issues.

9 participants