On 23/10/13 18:07, W-Mark Kubacki wrote:
Hi,
As someone about to purchase two certificates please allow me to
weight in an outside perspective:
Thanks!
On 2013-10-22 12:09 UTC Maxim Dounin wrote:
An unwanted side effect would be that this will allow client
certificate authentication to use certs from a server's
certificate chain. Probably not something we want to happen.
On 2013-10-22 13:31 UTC Rob Stradling replied:
Yes, that's a potentially unwanted side effect. But unfortunately,
AFAICT, putting the intermediates into the "trusted certificates
store" is the only way to implement this feature with OpenSSL
<1.0.2.
Just drop the backwards-compatibility and require OpenSSL 1.0.2 or
later for that feature, just like a particular version of OpenSSL is
needed for TLS-SNI.
Apache httpd can do RSA+DSA+ECC with OpenSSL 1.0.0, and OCSP Stapling
works correctly (in recent OpenSSL versions anyway - see [1] ;-) ).
Why wouldn't Nginx want to offer the same compatibility?
CAs are already starting to sell ECC certs. OpenSSL 1.0.2 isn't even
released yet, so most sites will be stuck on <1.0.2 for quite some time.
Most sites don't use TLS client authentication, so they wouldn't be
affected by the "unwanted side effect" anyway.
On 2013-10-23 00:25 UTC Maxim Dounin wrote:
Given the number of problems, it might be easier to assume the
[certificate-]chains must be the same. […]
• When you are about to get two certificates, most likely RSA+ECC, you
go for a ECC-only and a RSA-only chain: The former because clients
support ECC anyway, all the way up to the CA. If not, then the latter
»classic« RSA-chain would be used.
• Additionally, it enables you to purchase from more than one CA —
which is good if a visitor with a recent browser doesn't want to trust
a CA anymore.
I agree.
I would disable OCSP for now in such cases and implement it later.
Why's that?
[1]
http://git.openssl.org/gitweb/?p=openssl.git;a=patch;h=bb65e3f22bc743f2427b6ed4144d654ec7ddaeef
--
Rob Stradling
Senior Research & Development Scientist
COMODO - Creating Trust Online
_______________________________________________
nginx-devel mailing list
nginx-devel@nginx.org
http://mailman.nginx.org/mailman/listinfo/nginx-devel