Please do not reply to this email- if you want to comment on the bug, go to the URL shown below and enter your comments there.
Changed by [EMAIL PROTECTED] http://bugzilla.ximian.com/show_bug.cgi?id=78226 --- shadow/78226 2006-04-28 06:44:45.000000000 -0400 +++ shadow/78226.tmp.3190 2006-06-21 10:07:44.000000000 -0400 @@ -1,13 +1,13 @@ Bug#: 78226 Product: Mono: Class Libraries Version: 1.1 OS: unknown OS Details: -Status: ASSIGNED -Resolution: +Status: RESOLVED +Resolution: WONTFIX Severity: Unknown Priority: Wishlist Component: Mono.Security AssignedTo: [EMAIL PROTECTED] ReportedBy: [EMAIL PROTECTED] QAContact: [EMAIL PROTECTED] @@ -190,6 +190,15 @@ openssl.cnf. As far as I can read the RFCs, RFC3280 suggests that whilst purpose is optional, "Certificate using applications MAY require that a particular purpose be indicated in order for the certificate to be acceptable to that application." - That said, I may be misinterpreting. + +------- Additional Comments From [EMAIL PROTECTED] 2006-06-21 10:07 ------- +After re-reading the specs, I won't change the current default +settings of Mono.Security.dll. + +We already have mechanism to accept any kind of certificate inside +Mono.Security.dll and thru HttpWebRequest. Recent versions of +Novell.Directory.Ldap also include an optional, user-defined, server +certificate validation delegate. _______________________________________________ mono-bugs maillist - [email protected] http://lists.ximian.com/mailman/listinfo/mono-bugs
