Hi Etkal,

>>s_client app or the OpenSSL cert store functionality that changed this.
The problem is with the openSSL store itself, as I had tested this with my
own SSL client and observed the same behaviour.

--
Ashok

On Thu, Sep 13, 2012 at 8:39 PM, Erik Tkal <et...@juniper.net> wrote:

> I suppose that’s a workaround, but doesn’t address the root cause.
> Windows can quite happily handle expired certificates still hanging out in
> trusted stores; I see this all the time as root updates occur and renewed
> certificates are installed.  It seems that a change in OpenSSL broke the
> previous behaviour that allowed this as well, though we can’t tell if it’s
> the s_client app or the OpenSSL cert store functionality that changed this.
> ****
>
>
> ....................................
> *Erik Tkal**
> *Juniper OAC/UAC/Pulse Development
>
> ****
>
> ** **
>
> *From:* owner-openssl-us...@openssl.org [mailto:
> owner-openssl-us...@openssl.org] *On Behalf Of *Charles Mills
> *Sent:* Thursday, September 13, 2012 9:42 AM
> *To:* openssl-users@openssl.org
> *Subject:* RE: certificate validation issues with openssl 1.0.0 and
> expired certificates in cafile****
>
> ** **
>
> Would it make sense to delete the expired certificate from the Windows
> store? Duplicate expired/non expired CA certificates sounds to me like a
> problem waiting to happen.****
>
> ** **
>
> *Charles*****
>
> *From:* owner-openssl-us...@openssl.org [
> mailto:owner-openssl-us...@openssl.org <owner-openssl-us...@openssl.org>]
> *On Behalf Of *Ashok C
> *Sent:* Thursday, September 13, 2012 12:49 AM
> *To:* openssl-users@openssl.org
> *Subject:* Re: certificate validation issues with openssl 1.0.0 and
> expired certificates in cafile****
>
> ** **
>
> Sending again as the previous email did not appear in list.
> Is there some problem with the mailing list?
>
> --
> Ashok****
>
> On Wed, Sep 12, 2012 at 2:59 PM, Ashok C <ash....@gmail.com> wrote:****
>
> Hi,
>
> I don't think this question was answered. Could you please reply?
>
> --
> Ashok****
>
> ** **
>
> On Tue, Jul 31, 2012 at 11:13 PM, Klaus Darilion <
> klaus.mailingli...@pernau.at> wrote:****
>
> Hi!
>
> I wrote a small program which dumps all root certificates from Windows
> certificate store into a file. Then I use openssl to connect to Google and
> validate its certificate:
>
> openssl s_client -connect www.google.com:443 -CAfile dump.crt
>
> When using openssl0.9.8k or openssl0.9.8x everything works as expected.
>
> When using openssl1.0.0g or openssl 1.0.1c the certificate validation
> fails with:
>   Verify return code: 10 (certificate has expired)
>
> CONNECTED(0000016C)
> depth=2 C = US, O = "VeriSign, Inc.", OU = Class 3 Public Primary
> Certification Authority
> verify error:num=10:certificate has expired
> notAfter=Jan  7 23:59:59 2004 GMT
> verify return:0
> ---
> Certificate chain
>  0 s:/C=US/ST=California/L=Mountain View/O=Google Inc/CN=www.google.com
>    i:/C=ZA/O=Thawte Consulting (Pty) Ltd./CN=Thawte SGC CA
>  1 s:/C=ZA/O=Thawte Consulting (Pty) Ltd./CN=Thawte SGC CA
>    i:/C=US/O=VeriSign, Inc./OU=Class 3 Public Primary Certification
> Authority
>
> When analyzing the cafile with the dumped certificates from Windows
> certificate store, I found out that there are two certificates for Verisign
> with identical subject, whereas one is expired, the other not.
>
> X.509 Certificate Information:
>         Version: 1
>         Serial Number (hex): 00e49efdf33ae80ecfa5113e19a4240232
>         Issuer: C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary
> Certification Authority
>         Validity:
>                 Not Before: Mon Jan 29 00:00:00 UTC 1996
>                 Not After: Wed Jan 07 23:59:59 UTC 2004
>         Subject: C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary
> Certification Authority
>         Subject Public Key Algorithm: RSA
>
> X.509 Certificate Information:
>         Version: 1
>         Serial Number (hex): 70bae41d10d92934b638ca7b03ccbabf
>         Issuer: C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary
> Certification Authority
>         Validity:
>                 Not Before: Mon Jan 29 00:00:00 UTC 1996
>                 Not After: Tue Aug 01 23:59:59 UTC 2028
>         Subject: C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary
> Certification Authority
>         Subject Public Key Algorithm: RSA
>
>
> Thus, it seems that openssl 0.9.8 just ignores the expired certificate and
> searches if there is another valid one whereas openssl 1.0.0 stop with the
> first expired certificate.
>
> Is the new behavior the intended behavior? Is it possible to have the old
> behavior also in new openssl versions?
>
> Thanks
> Klaus
>
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           majord...@openssl.org****
>
> ** **
>
> ** **
>

Reply via email to