Bug#514807: libgnutls13: Security update causes "TLS certificate verification: Error, Unknown error"
Edward Allcutt
emallcut at gleim.com
Wed Feb 11 17:00:59 UTC 2009
retitle 514807 X.509v1 CA certs no longer trusted implicitly
thanks
Simon Josefsson wrote:
> Edward Allcutt <emallcut at gleim.com> writes:
>> Simon Josefsson wrote:
>>> I suspect the problem is that you have a RSA-MD5 signature somewhere in
>>> the certificate chain.
>> Nope, already checked that... gnutls-cli does work after all. It's the
>> other modules linked to libgnutls that are failing.
>
> I believe the problem is that you have a V1 CA, which isn't permitted by
> default by libgnutls.
Only since this security update. I'm not saying that not trusting VA CAs
shouldn't be the correct ideal behavior but it does seem very
impractical right now. At the very least, can you postpone this change
in functionality until lenny?
> I don't recommend doing the same in other applications, and we should
> probably remove it from gnutls-cli too. It may be useful to create a
> parameter in other tools to enable the flag on a per-case basis, though.
Those applications which need to change their flags should of course be
patched to do so, but not in stable. This seems like a change in the API
of libgnutls. A change towards what is documented, granted, but a change
nonetheless and away from what most applications seem to expect.
> For explanation of why V1 CA's are bad, see:
I understand that. The argument against
GNUTLS_VERIFY_ALLOW_ANY_X509_V1_CA_CRT is very strong, but the argument
against GNUTLS_VERIFY_ALLOW_X509_V1_CA_CRT seems rather weak, especially
given most applications give a list of trusted CAs, not non-CAs.
In addition, at least one very popular CA still seems to use a v1 cert
as their root. They have new v3 root certs however these aren't included
in ca-certificates until lenny.
> I'm tagging this as wontfix since this is the documented and intended
> behaviour. I am sorry you had to notice it through an upgrade --
> however the reason for the upgrade was to close this hole.
Hmm, I thought the reason for the upgrade was to close this hole:
CVE-2008-4989. Fixing this deviation from documentation was just a
side-effect.
--
Edward Allcutt
Network Operations
More information about the Pkg-gnutls-maint
mailing list