Suppressible and non-suppressible certificate validation checks #1341
Closed
oliveirars
started this conversation in
General
Replies: 1 comment 1 reply
-
In practice I've found it best to leave an escape hatch for applications/implementations to choose to deviate from the spec on purpose to get a connection established. I'm not sure additional effort to make it impossible to configure invalid validation checks is worth it, though certainly some sane defaults and documentation about what is or isn't mandatory according to the spec should exist. |
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Hi guys.
I've recently had an issue using certificates to authenticate a software (using Eclipse Milo) on an OPC-UA server.
While I was investigating, I noticed two issues related to certificate validations. According to OPC-UA version 1.03 specification:
The APPLICATION_URI check may not be suppressed. Although this validation is included in the list of NO_OPTIONAL_CHECKS, a client software component could instantiate the
DefaultClientCertificateValidator
passing a collection without this check, making this check optional.The REVOCATION check may not be suppressed, but it seems not to be handled as so - it is not in the non-optional checks collection, for example. In this case, an external component could pass a set of checks without this one.
My understanding can be wrong, but it seems the library should handle these as mandatory. Is there some reason to adopt a different strategy?
Beta Was this translation helpful? Give feedback.
All reactions