Joachim Breitner <nome...@debian.org> writes:

> Package: libgnutls26
> Version: 2.4.2-5
> Severity: important
>
> Hi Andreas,
>
> with your recent upload of gnults, this signature of a host with a
> recently generated cacert signature is no longer valid:
>
> $ gnutls-cli -VV fry.serverama.de -p 443 --x509cafile 
> /etc/ssl/certs/ca-certificates.crt 
...
> - Peer's certificate is NOT trusted

CACert's intermediate certificate is signed using RSA-MD5, so it won't
pass GnuTLS chain verification logic.

I've improved the error message, so now the above command will print:

- Peer's certificate chain uses insecure algorithm
- Peer's certificate is NOT trusted

As a workaround, add the --insecure parameter.

We should probably consider to back-port Donald's logic to short-circuit
chain verification as soon as you have a trusted cert: then you could
chose to trust CACerts intermediate cert, and then there is no need to
rely on RSA-MD5 to trust this chain.  I'll test if the patch would help
in your situation.

/Simon



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to