Hi Bartosz, Adding Equifax Secure CA one to the list of trusted CA's sounds like a good idea to me.
On Fri, Jun 7, 2013 at 5:25 AM, Bartosz Brachaczek <b.brachac...@gmail.com>wrote: > (Reposting my conversation with Wojtek to the mailing list. I have > just noticed we switched away from it). > > 2013/6/7 Bartosz Brachaczek <b.brachac...@gmail.com>: > > 2013/6/6 Wojtek Kaniewski <wojte...@toxygen.net>: > >> Dnia 2013-06-04, wto o godzinie 13:37 +0200, Bartosz Brachaczek pisze: > >>> But checking which certificates are accepted by the proprietary client > >>> should be straightforward, as the current version of it is written in > >>> XUL and uses xulrunner's/gecko's methods of verifying certificates. I > >>> can volunteer to check this. If it turns out that the proprietary > >>> client trusts a CA that is not universally trusted, we might want to > >>> trust the same one when connecting to the Gadu-Gadu network in > >>> libgadu. > >> > >> Right now they use RapidSSL certificate issued by Equifax Secure > >> Certificate Authority. I can see their certificate in my Ubuntu, so I > >> guess it would be a matter of setting some flag to verify against > >> preinstalled certificates, adding them to a list of trusted CA's or > >> something similar. > > > > That's right, I have incorrectly assumed OpenSSL is using system CA > > cert store by default, and it's not the case. > > > > So the functions of interest are: > > a) for OpenSSL: > > -- SSL_CTX_set_default_verify_paths() to use CA cert store configured > > during OpenSSL's build > > -- SSL_get_verify_result() to retrieve certificate verification result > > b) for GnuTLS: > > -- gnutls_certificate_set_x509_system_trust() to use default system CA > > cert store, requires GnuTLS >= 3.0 so it can be problematic > > (alternatively gnutls_certificate_set_x509_trust_file() can be used to > > point to specific files; in OpenSSL that would of course be possible, > > too) > > -- gnutls_certificate_verify_peers2() and > > gnutls_x509_crt_check_hostname() to verify the certificate validity > > > >> > >> As for rejecting invalid certificates, what do you think about leaving > >> behaviour for GG_SSL_ENABLED as is, but adding a obligatory check in > >> case of GG_SSL_REQUIRED? This way users would be still able to use SSL > >> (on their own risk) if the CA changed to something obscure. > > > > I think it makes sense. > > > >> > >> Regards, > >> Wojtek > >> > -- Regards, Radhesh Krishnan K.
_______________________________________________ libgadu-devel mailing list libgadu-devel@lists.ziew.org http://lists.ziew.org/mailman/listinfo/libgadu-devel