Hey,

On Mon, Jul 17, 2017 at 8:58 AM, Niklas Keller <m...@kelunik.com> wrote:

> Hi,
>>
>> >       After reading related discussion on openssl-users [1], I'm not so
>> sure if
>> >       we should be doing that at all...
>> >
>> >       Especially I agree with this bit:
>> >
>> >       "Making your code more complex is a far higher risk than a
>> practical
>> >       certificate forgery based on a collision attack on SHA-1. "
>> >
>> >       The only thing, that makes sense IMHO would be adding support for
>> > setting
>> >       security level only for OpenSSL 1.1.
>> >
>> >       [1]
>> >       http://openssl.6102.n7.nabble.com/Rejecting-SHA-1-certificates-
>> > td71439.html <http://openssl.6102.n7.nabble.com/Rejecting-SHA-1-
>> > certificates-td71439.html>
>> >
>> >
>> > Same here actually. While it's trivial to implement with OpenSSL 1.1,
>> it's non-
>> > trivial before, because there's no API to get the trusted chain AFAIK,
>> so we
>> > would indeed have to do this inside verify_callback.
>> >
>> Thanks for the responses and for the discussion link. With that, the
>> situation is simplified a lot. This allows for a better conceived patch and
>> there's obviously no strong reason to touch the stable branches.
>>
>> Thanks.
>>
>> Anatol
>>
>
> @Jakub: Do we want to expose "auth_level" then in case PHP is linked
> against OpenSSL 1.1.0+?
>
>
>
I just pushed support for security_level [1] which is more comprehensive
and the patch is also very simple.

Apology for such last minute addition but I felt that it is really useful
for 7.2 and I have already messaged about that and haven't heard any
objections. Of course if anyone feels strongly against it, I will be happy
to reconsider it.

Cheers

Jakub

Reply via email to