[stunnel-users] Why does verify=3 require the entire cert chain to be present in cafile?

yyy yyy at yyy.id.lv
Wed Nov 2 16:20:12 CET 2011


OP did not ask for PKI. It is obvious that directly trusted server 
certificate cannot be revoked.
The necessary option is that ANY directly trusted certificate should be 
treated as self signed.
(For example server cert is trusted, but CA is not) There might be other 
users, who trusts CA,
but does not trusts server cert directly, so server cert were signed by CA
for sake of that subset of users.

----- Original Message ----- 
From: "Jochen Bern" <Jochen.Bern at LINworks.de>
To: <stunnel-users at stunnel.org>
Sent: Wednesday, November 02, 2011 2:05 PM
Subject: Re: [stunnel-users] Why does verify=3 require the entire cert chain 
to be present in cafile?

Whether "the PKI model" ***ALLOWS*** overlaying a Web of Trust in
addition to the hierarchical structure is debatable. As I already
mentioned, not going through the CA certs effectively disables
(automated) CRL checking, which is a pretty dubious "improvement".





More information about the stunnel-users mailing list