Please do not reply to this email- if you want to comment on the bug, go to the
URL shown below and enter your comments there.

Changed by [EMAIL PROTECTED]

http://bugzilla.ximian.com/show_bug.cgi?id=78226

--- shadow/78226        2006-04-28 06:44:45.000000000 -0400
+++ shadow/78226.tmp.3190       2006-06-21 10:07:44.000000000 -0400
@@ -1,13 +1,13 @@
 Bug#: 78226
 Product: Mono: Class Libraries
 Version: 1.1
 OS: unknown
 OS Details: 
-Status: ASSIGNED   
-Resolution: 
+Status: RESOLVED   
+Resolution: WONTFIX
 Severity: Unknown
 Priority: Wishlist
 Component: Mono.Security
 AssignedTo: [EMAIL PROTECTED]                            
 ReportedBy: [EMAIL PROTECTED]               
 QAContact: [EMAIL PROTECTED]
@@ -190,6 +190,15 @@
 openssl.cnf.
 
 As far as I can read the RFCs, RFC3280 suggests that whilst purpose is
 optional, "Certificate using applications MAY require that a
 particular purpose be indicated in order for the certificate to be
 acceptable to that application." - That said, I may be misinterpreting.
+
+------- Additional Comments From [EMAIL PROTECTED]  2006-06-21 10:07 -------
+After re-reading the specs, I won't change the current default
+settings of Mono.Security.dll.
+
+We already have mechanism to accept any kind of certificate inside
+Mono.Security.dll and thru HttpWebRequest. Recent versions of
+Novell.Directory.Ldap also include an optional, user-defined, server
+certificate validation delegate.
_______________________________________________
mono-bugs maillist  -  [email protected]
http://lists.ximian.com/mailman/listinfo/mono-bugs

Reply via email to