From: grarpamp <gra...@gm...> - 2010-09-03 06:38:38
|
> # SECURITY IMPROVEMENTS TO DEFANG X.509 CERTIFICATE ABUSE As a general note, should the degree of lint checking potentially impact CA/self/unsigned certs with various parametes that clueless operators might be using... if the user specifies the md5 and/or sha1 fingerprint, along with a future 'accept_fingerprint' option, that cert should be accepted despite said lint. Every so often someones business requirement forces them to use/do silly things with certs :) |