OSSL_CMP_{validate_msg,CTX_new}.pod: add warning notes on OSSL_CMP_OPT_PERMIT_TA_IN_EXTRACERTS_FOR_IR
Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Neil Horman <nhorman@openssl.org> (Merged from https://github.com/openssl/openssl/pull/23814)
This commit is contained in:
parent
b893ceef2f
commit
40948c4c74
@ -343,6 +343,11 @@ RFC 4210.
|
|||||||
|
|
||||||
Allow retrieving a trust anchor from extraCerts and using that
|
Allow retrieving a trust anchor from extraCerts and using that
|
||||||
to validate the certificate chain of an IP message.
|
to validate the certificate chain of an IP message.
|
||||||
|
This is a quirk option added to support 3GPP TS 33.310.
|
||||||
|
|
||||||
|
Note that using this option is dangerous as the certificate obtained
|
||||||
|
this way has not been authenticated (at least not at CMP level).
|
||||||
|
Taking it over as a trust anchor implements trust-on-first-use (TOFU).
|
||||||
|
|
||||||
=item B<OSSL_CMP_OPT_NO_CACHE_EXTRACERTS>
|
=item B<OSSL_CMP_OPT_NO_CACHE_EXTRACERTS>
|
||||||
|
|
||||||
|
@ -42,11 +42,14 @@ using any trust store set via L<OSSL_CMP_CTX_set0_trusted(3)>.
|
|||||||
|
|
||||||
If the option OSSL_CMP_OPT_PERMIT_TA_IN_EXTRACERTS_FOR_IR was set by calling
|
If the option OSSL_CMP_OPT_PERMIT_TA_IN_EXTRACERTS_FOR_IR was set by calling
|
||||||
L<OSSL_CMP_CTX_set_option(3)>, for an Initialization Response (IP) message
|
L<OSSL_CMP_CTX_set_option(3)>, for an Initialization Response (IP) message
|
||||||
any self-issued certificate from the I<msg> extraCerts field may also be used
|
any self-issued certificate from the I<msg> extraCerts field may be used
|
||||||
as trust anchor for the path verification of an acceptable cert if it can be
|
as a trust anchor for the path verification of an 'acceptable' cert if it can be
|
||||||
used also to validate the issued certificate returned in the IP message. This is
|
used also to validate the issued certificate returned in the IP message. This is
|
||||||
according to TS 33.310 [Network Domain Security (NDS); Authentication Framework
|
according to TS 33.310 [Network Domain Security (NDS); Authentication Framework
|
||||||
(AF)] document specified by the The 3rd Generation Partnership Project (3GPP).
|
(AF)] document specified by the The 3rd Generation Partnership Project (3GPP).
|
||||||
|
Note that using this option is dangerous as the certificate obtained this way
|
||||||
|
has not been authenticated (at least not at CMP level).
|
||||||
|
Taking it over as a trust anchor implements trust-on-first-use (TOFU).
|
||||||
|
|
||||||
Any cert that has been found as described above is cached and tried first when
|
Any cert that has been found as described above is cached and tried first when
|
||||||
validating the signatures of subsequent messages in the same transaction.
|
validating the signatures of subsequent messages in the same transaction.
|
||||||
|
Loading…
x
Reference in New Issue
Block a user