• Adam Langley's avatar
    crypto/tls: use pool building for certificate checking · 836529a6
    Adam Langley authored
    Previously we checked the certificate chain from the leaf
    upwards and expected to jump from the last cert in the chain to
    a root certificate.
    
    Although technically correct, there are a number of sites with
    problems including out-of-order certs, superfluous certs and
    missing certs.
    
    The last of these requires AIA chasing, which is a lot of
    complexity. However, we can address the more common cases by
    using a pool building algorithm, as browsers do.
    
    We build a pool of root certificates and a pool from the
    server's chain. We then try to build a path to a root
    certificate, using either of these pools.
    
    This differs from the behaviour of, say, Firefox in that Firefox
    will accumulate intermedite certificate in a persistent pool in
    the hope that it can use them to fill in gaps in future chains.
    
    We don't do that because it leads to confusing errors which only
    occur based on the order to sites visited.
    
    This change also enabled SNI for tls.Dial so that sites will return
    the correct certificate chain.
    
    R=rsc
    CC=golang-dev
    https://golang.org/cl/2916041
    836529a6
Name
Last commit
Last update
..
Makefile Loading commit data...
alert.go Loading commit data...
ca_set.go Loading commit data...
common.go Loading commit data...
conn.go Loading commit data...
generate_cert.go Loading commit data...
handshake_client.go Loading commit data...
handshake_messages.go Loading commit data...
handshake_messages_test.go Loading commit data...
handshake_server.go Loading commit data...
handshake_server_test.go Loading commit data...
prf.go Loading commit data...
prf_test.go Loading commit data...
tls.go Loading commit data...