#3559: smime_keys.pl considers only first certificate of a chain --------------------+------------------------------------------------------- Reporter: andy | Owner: mutt-dev Type: defect | Status: new Priority: minor | Milestone: Component: crypto | Version: 1.5.21 Keywords: | --------------------+------------------------------------------------------- When smime_keys.pl is used as smime_import_cert_command to add keys via the extract-keys function (Ctrl-K), it gets the whole certificate chain from the pkcs7 data (via smime_pk7out_command and smime_get_cert_command). Before 1.5.21, smime_keys.pl split the certificates and handled them as separate user certificates, which was wrong. Now it takes the chain as a whole, which is better (best would be automatically splitting it into leaf certificate and intermediate chain certificates, but that would be asking too much), but since it now calls openssl to extract information from the whole chain (e.g. "$opensslbin x509 -email" in line 469), it gets information for the first certificate in the chain, which may or may not be the user's certificate - mutt appends the intermediate certificates to the user certificate, other MUAs start the chain with the root CA, the user's certificate being last. This results in (at least) no .index entry if the root CA certificate has no associated email address, or even a wrong .index entry. A solution would require to split up the chain of certificates, to reconstruct the correct order and to apply the single- certificate-commands to the user's certificate - well, then we're almost at the aforementioned automatic handling of intermediate chain certificates.
If you see this as a valid point, but are in need of someone to code it, I'd volunteer to give it a try... -- Ticket URL: <http://dev.mutt.org/trac/ticket/3559> Mutt <http://www.mutt.org/> The Mutt mail user agent