>
> Hi,
>
> >       After reading related discussion on openssl-users [1], I'm not so
> sure if
> >       we should be doing that at all...
> >
> >       Especially I agree with this bit:
> >
> >       "Making your code more complex is a far higher risk than a
> practical
> >       certificate forgery based on a collision attack on SHA-1. "
> >
> >       The only thing, that makes sense IMHO would be adding support for
> > setting
> >       security level only for OpenSSL 1.1.
> >
> >       [1]
> >       http://openssl.6102.n7.nabble.com/Rejecting-SHA-1-certificates-
> > td71439.html <http://openssl.6102.n7.nabble.com/Rejecting-SHA-1-
> > certificates-td71439.html>
> >
> >
> > Same here actually. While it's trivial to implement with OpenSSL 1.1,
> it's non-
> > trivial before, because there's no API to get the trusted chain AFAIK,
> so we
> > would indeed have to do this inside verify_callback.
> >
> Thanks for the responses and for the discussion link. With that, the
> situation is simplified a lot. This allows for a better conceived patch and
> there's obviously no strong reason to touch the stable branches.
>
> Thanks.
>
> Anatol
>

@Jakub: Do we want to expose "auth_level" then in case PHP is linked
against OpenSSL 1.1.0+?

Regards, Niklas

Reply via email to