On Friday, April 07, 2017 13:45:48 Kamil Dudka wrote: > On Friday, April 07, 2017 13:34:42 Kai Engert wrote: > > On Fri, 2017-04-07 at 11:54 +0200, Kamil Dudka wrote: > > > On Friday, April 07, 2017 11:01:35 Kai Engert wrote: > > > > On Fri, 2017-04-07 at 10:38 +0200, Kamil Dudka wrote: > > > > > Although we build libcurl against NSS now, it loads the same CA > > > > > bundle > > > > > as > > > > > > > > > > if we built it against OpenSSL: > > > > > /etc/pki/tls/certs/ca-bundle.crt > > > > > > > > > > So I doubt it could actually take advantage of those extra flags. > > > > > > > > This file doesn't contain the distrust flags. > > > > > > > > The correct file would be /etc/pki/tls/certs/ca-bundle.trust.crt > > > > > > Yes, but it does not make sense to load such a file by nss-pem because > > > it > > > does > > > not support those flags anyway. The correct fix for NSS-linked libcurl > > > would probably be to just disable loading the CA roots from file by > > > default. > > > > Why do you mentioned a need to fix curl-nss? > > Because the NSS-linked libcurl in Fedora currently works in a way that it > does not take advantage of the extended validation features implemented in > NSS, as I understand it. > > > The regular approach for NSS applications is to load the NSS libnssckbi.so > > (now the drop-in replacement p11-kit-trust.so), which provides all trust > > and distrust information in a format that NSS can handle. > > > > How does curl-nss load the CA trust list? > > libcurl loads /etc/pki/tls/certs/ca-bundle.trust.crt using the nss-pem > module. Sorry. Copy-paste error. I meant /etc/pki/tls/certs/ca-bundle.crt of course. Kamil > > If curl-nss doesn't load libnssckbi.so/p11-kit-trust.so but rather loads a > > simple PEM file, then today's curl-nss doesn't use distrust information. > > Exactly. It sounds like there is still some room for improvement. > > Kamil > > > Kai _______________________________________________ devel mailing list -- devel@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe send an email to devel-leave@xxxxxxxxxxxxxxxxxxxxxxx