* Simon Josefsson:

> Florian Weimer <f...@deneb.enyo.de> writes:
>
>> Simon, could we make the harmless variant (X.509v1 certificate set as
>> trusted is accepted as a root CA, but intermediate X.509v1
>> certificates aren't accepted) the default in etch?

> It may be that the practical problems are more important than the
> potential security problem here, which would argue for using the patch.

This seems to be the case.

I would like to apply the following patch to etch and lenny.  Any
objections?

> diff --git a/lib/gnutls_cert.c b/lib/gnutls_cert.c
> index 7872f20..fe7ad22 100644
> --- a/lib/gnutls_cert.c
> +++ b/lib/gnutls_cert.c
> @@ -280,6 +280,7 @@ gnutls_certificate_allocate_credentials 
> (gnutls_certificate_credentials_t *
>  
>    (*res)->verify_bits = DEFAULT_VERIFY_BITS;
>    (*res)->verify_depth = DEFAULT_VERIFY_DEPTH;
> +  (*res)->verify_flags = GNUTLS_VERIFY_ALLOW_X509_V1_CA_CRT;
>  
>    return 0;
>  }



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to