Eddy Nigg (StartCom Ltd.) wrote:
Rob Crittenden wrote:
Yes, mod_nss supports the same environment variables as mod_ssl.
http://directory.fedoraproject.org/wiki/Mod_nss
I couldn't figure (explicit) from that page that this is the case....

http://directory.fedoraproject.org/docs/mod_nss.html#Environment

Normally mod_nss will not let you start Apache with a bad certificate (expired, not a server cert, etc). NSSEnforceValidCerts lets you override that.
OK
There is no equivalent for SSLVerifyDepth. My understanding of how intermediate CAs are evaluated in NSS is admittedly sketchy but I believe it requires all of them to be installed and trusted.
That seems to be the most likely explanation - knowing NSS. In client auth however the client mustn't send the full chain (not sure about that?) and the (intermediate) issuer doesn't have to be necessary the same as the one on the server... How can I limit authentication to accept only one specific CA and otherwise fail? I expect here to run into the issue of Mozilla browser selecting the most convenient client certificate by its own by default....

You can probably set up an NSSRequire rule for it:

NSSRequire ( %{SSL_CLIENT_I_DN_O} eq "My CA")

Or something like that.

Since mod_nss is conveniently included in Red Hat / StartCom Enterprise, I'll give it a shot on a test server...

Sure. Let me know if you run into any problems.

rob

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to