Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

openssl: Don't ignore CA paths when using Windows CA store (redux) #10244

Closed
wants to merge 1 commit into from

Conversation

jay
Copy link
Member

@jay jay commented Jan 5, 2023

This commit restores the behavior of CURLSSLOPT_NATIVE_CA so that it does not override CURLOPT_CAINFO / CURLOPT_CAPATH, or the hardcoded default locations. Instead the CA store can be used at the same time.


This behavior was originally added over two years ago in abbc5d6 (#5585) but then 83393b1 (#7892) broke it two months ago a year ago, I assume inadvertently.

The CURLSSLOPT_NATIVE_CA feature is marked experimental and likely rarely used.

Ref: #5585
Ref: #7892
Ref: https://curl.se/mail/lib-2023-01/0019.html

Closes #xxxx


Tested with CURLOPT_CAINFO not set and CURLSSLOPT_NATIVE_CA set; self-signed CA in MS root store; verified successfully.
Tested with CURLOPT_CAINFO set to curl default CA bundle and CURLSSLOPT_NATIVE_CA set; self-signed CA in MS root store; verified successfully.
Tested with CURLOPT_CAINFO set to self-signed CA and CURLSSLOPT_NATIVE_CA set; same self-signed CA not in MS root store; verified successfully.
Tested with CURLOPT_CAINFO set to self-signed CA and CURLSSLOPT_NATIVE_CA set; same self-signed CA in MS root store; verified successfully.

@jay jay added TLS Windows Windows-specific labels Jan 5, 2023
@bagder
Copy link
Member

bagder commented Jan 6, 2023

Please also document this.

@jay jay force-pushed the openssl_native_ca_restore branch from 7c50470 to ae316ef Compare January 7, 2023 00:06
@jeroen
Copy link
Contributor

jeroen commented Jan 8, 2023

Shall we remove the experimental flag as part of this patch?

.. and remove 'experimental' designation from CURLSSLOPT_NATIVE_CA.

This commit restores the behavior of CURLSSLOPT_NATIVE_CA so that it
does not override CURLOPT_CAINFO / CURLOPT_CAPATH, or the hardcoded
default locations. Instead the CA store can be used at the same time.

---

This behavior was originally added over two years ago in abbc5d6
(curl#5585) but then 83393b1 (curl#7892) broke it two months ago, I assume
inadvertently.

The CURLSSLOPT_NATIVE_CA feature was marked experimental and likely
rarely used.

Ref: curl#5585
Ref: curl#7892
Ref: https://curl.se/mail/lib-2023-01/0019.html

Closes #xxxx
@jay jay force-pushed the openssl_native_ca_restore branch from ae316ef to caaf01a Compare January 11, 2023 19:33
@jay
Copy link
Member Author

jay commented Jan 11, 2023

Shall we remove the experimental flag as part of this patch?

I only see an experimental marking in EXPERIMENTAL.md so I removed it from that. Let me know if that is what you meant because I can't find anything else that designates it as experimental.

@jeroen
Copy link
Contributor

jeroen commented Jan 11, 2023

Thanks. I meant the wording in the documentation for this field "This option is experimental and behavior is subject to change." but I see you already fixed this!

@jay jay closed this in c4cd0e2 Jan 17, 2023
@jay jay deleted the openssl_native_ca_restore branch January 17, 2023 08:35
bch pushed a commit to bch/curl that referenced this pull request Jul 19, 2023
.. and remove 'experimental' designation from CURLSSLOPT_NATIVE_CA.

This commit restores the behavior of CURLSSLOPT_NATIVE_CA so that it
does not override CURLOPT_CAINFO / CURLOPT_CAPATH, or the hardcoded
default locations. Instead the native Windows CA store can be used at
the same time.

---

This behavior was originally added over two years ago in abbc5d6
(curl#5585) but then 83393b1 (curl#7892) broke it over a year ago, I assume
inadvertently.

The CURLSSLOPT_NATIVE_CA feature was marked experimental and likely
rarely used.

Ref: curl#5585
Ref: curl#7892
Ref: https://curl.se/mail/lib-2023-01/0019.html

Closes curl#10244
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
TLS Windows Windows-specific
Development

Successfully merging this pull request may close these issues.

None yet

3 participants