Hello,

thank you for your response. There's one thing in your reply I don't
understand:

Erwann Abalea wrote:
>> It seems to be a valid certificate for OpenSSL, right?
>
> OpenSSL can parse it, yes.
>
> [...]
>
> Reading X.520 shows that the DirectoryString type disallows 0-sized
> elements. So you're right, this isn't a valid X.509 certificate.
>
> [...]
>
> GNUtls is primitive in some aspects, DN parsing is one of them.
> Anyway, the fault is shared between GNUtls and the CA. Not with OpenSSL.

If it isn't a valid X.509 certificate as you agreed, shouldn't openssl
complain when I verify/establish a connection using AUTH TLS which will use
this certificate?

So for me it is not a question about "tolerance" like you said OpenSSL's
ASN1 parser is more tolerant than GnuTLS (it uses libtasn1 BTW): If the
certificate is invalid, OpenSSL should tell it and verify shouldn't pass.

Not?


-- 
Regards,
Igor

Reply via email to