Skip to content

Fix #50713: openssl_pkcs7_verify() may ignore untrusted CAs #6927

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
wants to merge 1 commit into from

Conversation

cmb69
Copy link
Member

@cmb69 cmb69 commented Apr 29, 2021

openssl_pkcs7_verify() works fine with untrusted CAs, as long as one
doesn't specify a $signers_certificates_filename in which case the
verification fails, because we're not passing along the untrusted CAs
to PKCS7_get0_signers().


I would need some help regarding writing a regression test.

`openssl_pkcs7_verify()` works fine with untrusted CAs, as long as one
doesn't specify a `$signers_certificates_filename` in which case the
verification fails, because we're not passing along the untrusted CAs
to `PKCS7_get0_signers()`.
@cmb69 cmb69 requested a review from bukka April 29, 2021 12:20
@cmb69 cmb69 added the Bug label Apr 29, 2021
@bukka
Copy link
Member

bukka commented May 3, 2021

The change looks correct to me but we surely need a test for this. It would be really good to cover it as similar functionality is in CMS where it's not cover as well. Although it doesn't have this issue. I have been playing with integrating CertificateGenerator into it a bit but need more time to make it nicely work. I will let you know once I have got something working.

@bukka
Copy link
Member

bukka commented Oct 23, 2023

Finally got to this and managed to create a proper test. I opened new PR: #12499 so this can be closed.

@bukka bukka closed this Oct 23, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants