[openssl-users] sendmail, openssl 1.1.1, tls1.3
Viktor Dukhovni
openssl-users at dukhovni.org
Tue Oct 16 07:27:18 UTC 2018
On Tue, Oct 16, 2018 at 08:13:11AM +0200, Jakob Bohm via openssl-users wrote:
> > As for the 16K limit, and whether we should be sending client
> > CA names without further indication from the (TLS 1.3) client
> > to do so, I'm hoping Matt Caswell and or other team members
> > will chime in.
>
> Just for clarity, how is an OpenSSL 1.1.1 client supposed to tell
> the local validation code which CAs to trust, especially if loading
> the list before entering a chroot jail?
Loading CA files is not a problem in itself, the issue is that some
(typically server) applications overload the CAfile as also being
the source of CA hints to clients in certificate requests. This
creates bloated server certificate request messages. With TLS 1.3,
this is further compounded in applications that are *both* a server
and client, and use the *same* context for both purposes. Once
that happens, the CA hints are used in both directions.
> How is this different from the OpenSSL 1.0.x API?
The API is identical, what's different is that TLS 1.3 makes the
CA hints bidirectional, given such hints have never been useful
before, it is IMHO just needless generality that's counter-productive.
Perhaps OpenSSL should require an additional non-default configuration
to enable transmission of the client's CA DNs to the server.
Or perhaps separate the server->client and client->server CA name
lists in the SSL context, so that setting one does not (surprise!)
also set the other. Overloading the same setting for both directions
may not have anticipated bidirectional use of contexts.
Someone should perhaps open an issue to track whether anything needs
to change here beyond advice to users, and if so what.
--
Viktor.
More information about the openssl-users
mailing list