#3559: smime_keys.pl considers only first certificate of a chain
--------------------+-------------------------------------------------------
 Reporter:  andy    |       Owner:  mutt-dev
     Type:  defect  |      Status:  new     
 Priority:  minor   |   Milestone:          
Component:  crypto  |     Version:  1.5.21  
 Keywords:          |  
--------------------+-------------------------------------------------------
 When smime_keys.pl is used as smime_import_cert_command to add keys via
 the extract-keys function (Ctrl-K), it gets the whole certificate chain
 from the pkcs7 data (via smime_pk7out_command and smime_get_cert_command).
 Before 1.5.21, smime_keys.pl split the certificates and handled them as
 separate user certificates, which was wrong. Now it takes the chain as a
 whole, which is better (best would be automatically splitting it into leaf
 certificate and intermediate chain certificates, but that would be asking
 too much), but since it now calls openssl to extract information from the
 whole chain (e.g. "$opensslbin x509 -email" in line 469), it gets
 information for the first certificate in the chain, which may or may not
 be the user's certificate - mutt appends the intermediate certificates to
 the user certificate, other MUAs start the chain with the root CA, the
 user's certificate being last. This results in (at least) no .index entry
 if the root CA certificate has no associated email address, or even a
 wrong .index entry. A solution would require to split up the chain of
 certificates, to reconstruct the correct order and to apply the single-
 certificate-commands to the user's certificate - well, then we're almost
 at the aforementioned automatic handling of intermediate chain
 certificates.

 If you see this as a valid point, but are in need of someone to code it,
 I'd volunteer to give it a try...

-- 
Ticket URL: <http://dev.mutt.org/trac/ticket/3559>
Mutt <http://www.mutt.org/>
The Mutt mail user agent

Reply via email to