On Thu, Jun 03, 2010, Victor Duchovni wrote:

> On Thu, Jun 03, 2010 at 09:45:36PM +0200, Erwann ABALEA wrote:
> 
> > Hodie III Non. Iun. MMX, Victor Duchovni scripsit:
> > > On Thu, Jun 03, 2010 at 02:32:10PM -0400, jeff wrote:
> > > 
> > > > >   I would expect such constraints to only apply when
> > > > >   certificates are being *verified*. There seems to be
> > > > >   little point in preventing a CA from attempting to sign
> > > > > violating certificates.
> > > > 
> > > > Yes I later tried to "verify" and I still got no complaints.
> > > 
> > > As I said, the "verify" command only checks the trust chain, peer name
> > > verification, is not in scope.
> > 
> > It could fail to validate the chain, given the fact that the extension
> > is set critical, and not handled, even if recognized.
> 
> This is what the 1.0.0 version in fact does, but it also (as I just
> learned) supports name constraints. The 0.9.8 version of the verify(1)
> command-line utility does not check critical extensions:
> 
>       if (ctx->error == X509_V_ERR_UNHANDLED_CRITICAL_EXTENSION) ok=1;
> 
> The API raises the error, but verify(1) does not report it. In 1.0.0
> there is a new command-line switch to ignore critical extensions.
> 

The verify utility is designed to continue where possible for debugging
purposes. It should report the error via the callback and carry on.

OpenSSL 0.9.8 also includes an option to ignore critical extensions:
-ignore_critical

Steve.
--
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see: http://www.openssl.org
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to