mirror of
https://github.com/strongswan/strongswan.git
synced 2025-10-04 00:00:14 -04:00
RFC3779 requires to validate the addrblocks of issuer certificates strictly, that is, they must contain the extension and the claimed addrblock, up to the root CA. When working with third party root CAs that do not have the extension, this makes using the plugin impossible. So add a depth setting that limits the number of issuer certificates to check bottom-up towards the root CA. A depth value of 0 disables any issuer check, the default value of -1 checks all issuers in the chain, keeping the existing behavior. Closes strongswan/strongswan#860
23 lines
1.1 KiB
Plaintext
23 lines
1.1 KiB
Plaintext
charon.plugins.addrblock.strict = yes
|
|
Whether to strictly require addrblock extension in subject certificates.
|
|
|
|
If set to yes, a subject certificate without an addrblock extension is
|
|
rejected if the issuer certificate has such an addrblock extension. If set
|
|
to no, subject certificates issued without the addrblock extension are
|
|
accepted without any traffic selector checks and no policy is enforced
|
|
by the plugin.
|
|
|
|
charon.plugins.addrblock.depth = -1
|
|
How deep towards the root CA to validate issuer cert addrblock extensions.
|
|
|
|
RFC3779 requires that all addrblocks claimed by a certificate must be
|
|
contained in the addrblock extension of the issuer certificate, up to
|
|
the root CA. The default depth setting of -1 enforces this.
|
|
|
|
In practice, third party (root) CAs may not contain the extension, making
|
|
the addrblock extension unusable under such CAs. By limiting the validation
|
|
depth, only a certain level of issuer certificates are validated for proper
|
|
addrblock extensions: A depth of 0 does not check any issuer certificate
|
|
extensions, a depth of 1 only the direct issuer of the end entity
|
|
certificate is checkend, and so on.
|