[ 
https://issues.apache.org/jira/browse/PROTON-2021?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16801018#comment-16801018
 ] 

Andrew Stitcher commented on PROTON-2021:
-----------------------------------------

In order to maintain backward behaviour compatibility we will maintain the 
ANONYMOUS peer verification of a client pn_ssl_domain_t created directly with 
pn_ssl_domain(PN_SSL_MODE_CLIENT) for now. Even though this is secure.

However We will set up the ca certificate store by default for both client and 
server domains to be the system default trusted ca certificate store as this 
changes a previous error case into a secure case: Before setting the verify 
mode for an ssl domain to verify the certificate or the peer name without 
setting a trusted ca  certificate store would cause an error. Setting a store 
by default allows this error case to safely use the system default.

> [c] Make SSL/TLS usage more secure by default
> ---------------------------------------------
>
>                 Key: PROTON-2021
>                 URL: https://issues.apache.org/jira/browse/PROTON-2021
>             Project: Qpid Proton
>          Issue Type: Improvement
>          Components: proton-c
>            Reporter: Andrew Stitcher
>            Assignee: Andrew Stitcher
>            Priority: Major
>
> There are some aspects of using TLS with proton-c that are awkward and by 
> default less secure than they could be.
> A good example of this is that it is tricky to set up to verify peer names 
> against the system default ca certificate list. Even though this is carefully 
> set up under many (most?) modern OS distributions.
> Another example is that for a client on the internet verifying peer names is 
> the only safe way to use TLS, but this is not the default.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to