AW: RFC 9525 obsoletes commonName check
Michael Richardson
mcr at sandelman.ca
Sun Nov 19 07:23:52 UTC 2023
Viktor Dukhovni <openssl-users at dukhovni.org> wrote:
> These actually removed support for CN-ID, and it is great that the
> browsers are in a position to do that.
> OpenSSL, however, is used in all kinds of intramural legacy systems,
> and backwards-compatibility is an important consideration.
> If we stop accepting CN-ID fallback by default, barring evidence that
> "nobody" still relies on CN-ID, OpenSSL should at least initially (in
> the first LTS release that changes the default) provide a flag that
> reënables the fallback, and only remove support in a subsequent
> release, giving users ample time to make the transition.
What I would like is:
1) an API call that turns CN-ID fallback off.
2) an option for "openssl s_client" to invoke it.
3) ideally, an environment variable I can set that does (1).
(3) especially so that I can easily (without recompiling) test applications
that might still be relying on CN-ID check, and see that they are now sane.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 658 bytes
Desc: not available
URL: <https://mta.openssl.org/pipermail/openssl-users/attachments/20231119/0f84ccfb/attachment.sig>
More information about the openssl-users
mailing list