Skip to content

CRL handling is over-aggressive #65

@macintux

Description

@macintux

Per http://security.stackexchange.com/questions/10158/ocsp-and-crls-specified-in-ca-or-client-certificate it doesn't appear that a CRL is mandatory for every item in a chain of certificates.

Yet https://github.com/basho/riak_api/blob/develop/src/riak_api_ssl.erl#L101-L105 fails certificate validation without one.

This is impacting JRuby + our ruby client, and may well impact other applications attempting client-side certificate-based authentication.

cc @Vagabond in case he'd care to chime in. Not sure what the standards say here.

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions