←back to thread

42 points fairlight1337 | 2 comments | | HN request time: 0.408s | source
Show context
Rygian ◴[] No.40716106[source]
I would have liked to see the logic on client side to decide if the certificate presented by the server is valid.
replies(2): >>40716985 #>>40719447 #
1. Retr0id ◴[] No.40716985[source]
I'm a little surprised the OpenSSL API doesn't force you to consider this by default, but indeed it does not: https://www.openssl.org/docs/manmaster/man3/SSL_CTX_new.html...

> On session establishment, by default, no peer credentials verification is done. This must be explicitly requested, typically using SSL_CTX_set_verify(3).

Aside: According to those docs, SSLv23_client_method() is deprecated.

replies(1): >>40717064 #
2. Severian ◴[] No.40717064[source]
Yeah, not verifying server cert or OCSP/CRLs is a problem. DNS attacks can redirect and you'd be none the wiser.