Skip to content

Conversation

@0xhaven
Copy link

@0xhaven 0xhaven commented May 21, 2015

Mainly for use in a "Strict SSL"-compatibility checker. (CFSSL-149)

@coveralls
Copy link

Coverage Status

Coverage decreased (-0.08%) to 52.64% when pulling 32afbc3 on jacob/scan-pki-revocation into f088f39 on master.

@grittygrease
Copy link
Contributor

LGTM

scan/pki.go Outdated
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Style nitpicks: this should be a complete sentence. It would also be useful to explain why it might be redundant and why it's been kept in (even if the answer is just that the comment serves as a marker to go back and look at the code later).

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I didn't dive deep into all the checks x509#Certificate.VerifyHostname is doing, but I think cfssl/revoke#VerifyCertificate is covers a superset of them (obviously adding CRL and OCSP revocation checks).

I think it's probably best to just remove this "quick-fail" method, as it will give less descriptive errors.

@kisom
Copy link
Contributor

kisom commented May 26, 2015

One nit about a comment, other than that LGTM.

@0xhaven 0xhaven force-pushed the jacob/scan-pki-revocation branch from 32afbc3 to f4a1e87 Compare May 26, 2015 20:02
@coveralls
Copy link

Coverage Status

Coverage decreased (-0.01%) to 53.04% when pulling f4a1e87 on jacob/scan-pki-revocation into 9c0793f on master.

kisom added a commit that referenced this pull request May 26, 2015
scan: check for revocation in PKI ChainValidation
@kisom kisom merged commit 09f3458 into master May 26, 2015
@kisom kisom deleted the jacob/scan-pki-revocation branch May 26, 2015 20:34
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants