On Fri, Feb 17, 2017 at 03:37:11PM +0100, Yuri D'Elia wrote:
> When a CertificateFile is provided, do not trust the system store by
> default, since this is not the expected behavior for X.509 certificates.
> 
> SystemCertificates can still be explicitly allowed/disallowed to restore
> the previous behavior.
>
i've been wondering whether the options make sense together at all, but
there is a use case here: typically, you'd add a cert override after
your provider failed to renew their cert. however, at some point, they
likely will do the renewal, and it kind of makes sense when things just
continue to work when that happens. i'll even argue that this use case
is much more common than using a fixed cert specifically because you
don't trust the CA chain.

so at this point i think a better approach would be just extending the
manual by warning that system certs must be explicitly disabled for
maximal security.

it would also make sense to emit a notice when CertificateFile is
specified, but none of the certs matches.

also, the code should filter the file's contents and moan if there are
non-host certificates in it. that will catch the common case of people
erroneously specifying the system cert store in the option (which has no
effect whatsoever except wasting time).

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, SlashDot.org! http://sdm.link/slashdot
_______________________________________________
isync-devel mailing list
isync-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/isync-devel

Reply via email to