-
Notifications
You must be signed in to change notification settings - Fork 2.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix OpenSSL Implementation of ValidateCertificateChain(). #18125
Fix OpenSSL Implementation of ValidateCertificateChain(). #18125
Conversation
PR #18125: Size comparison from 8faa780 to cb7351f Increases above 0.2%:
Increases (2 builds for linux)
Full report (34 builds for cc13x2_26x2, cyw30739, efr32, esp32, k32w, linux, mbed, nrfconnect, p6, telink)
|
cb7351f
to
daf6d4f
Compare
PR #18125: Size comparison from 8faa780 to daf6d4f Increases above 0.2%:
Increases (2 builds for linux)
Full report (34 builds for cc13x2_26x2, cyw30739, efr32, esp32, k32w, linux, mbed, nrfconnect, p6, telink)
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Nice catch!
@emargolis memory checker seems to complain:
|
daf6d4f
to
0daa148
Compare
PR #18125: Size comparison from 54a39d7 to 0daa148 Increases above 0.2%:
Increases (2 builds for linux)
Full report (34 builds for cc13x2_26x2, cyw30739, efr32, esp32, k32w, linux, mbed, nrfconnect, p6, telink)
|
In the OpenSSL Implementation of ValidateCertificateChain() function the intermediate ceritificate is loaded as a trusted certificate, which opens door to various security attacks. Updated implementation: now loading intermediate certificate as untrusted certificate part of cert chain. Added test case that would identify this issue in the previous implementation.
0daa148
to
e7b6883
Compare
PR #18125: Size comparison from 3c3a422 to e7b6883 Increases above 0.2%:
Increases (2 builds for linux)
Full report (34 builds for cc13x2_26x2, cyw30739, efr32, esp32, k32w, linux, mbed, nrfconnect, p6, telink)
|
Problem
In the OpenSSL Implementation of ValidateCertificateChain() function the
intermediate certificate is loaded as a trusted certificate, which opens
door to various security attacks.
Change overview
Updated implementation: now loading intermediate certificate as
untrusted certificate part of cert chain.
Testing
Added test case that would identify this issue in the previous implementation.
all existing tests