Am 09.09.20 um 10:04 schrieb François Kooman:
> On 9/8/20 6:38 PM, Arne Schwabe wrote:
>> I really wonder which large deployment want to do that instead of a CA.
>> I really understand the need for small and simple deployments. But for
>> larger deployments a CA + CRL seems more useful for everything that I
>> can come up with.
> 
> It would be more for the situation where you already have a "parallel
> trust", e.g. through an OAuth API where a CA would be redundant. Just
> having an API to register fingerprints (which would act as a CRL at the
> same time by simply removing fingerprints) is easier than having a
> complete CA with CRL.
> 
> Of course, all of this can also be done by using a CA, and something can
> be said that if you operate on that scale you can also handle the extra
> "cost" of a CA...

I am happy to review a patch that adds a allow_no_ca or similar flag to
the tls-verify option that allows this but I don't have a real
motivation to implement it myself.

Just allowing ca not set with tls-verify script being set is a bit too
dangerous for my taste.

Arne

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to