New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
curl: add --ca-native and --proxy-ca-native #11049
Conversation
What are the intended semantics on non-Windows systems? A user might expect,
for examples, that selecting this on macOS would lead to switching to the
SecureTransport back-end. Or on other systems switching to OpenSSL. Doesn't NSS
have its own certificate store that this option might be expected to affect?
|
If/when someone adds support for non-Windows systems I figure they could work the same?
I don't think so. It is still not the OS's store. |
I think the other case to consider, in contrast to @dfandrich comment, is what happens when OpenSSL is configured to use the Windows Certificate store, but cURL was not invoked with I haven't looked at this area of OpenSSL in several years. My apologies if I got my wires crossed. |
This is code in libcurl that we activate with an |
Hmmm... I think Do you know if that option was removed? |
I don't know what that is, but I know that we don't use that. |
curl-for-win has it disabled, because by default it uses external engine DLLs, which in turn needs to have dynamic load capability enabled, which in turn still seems insecure in OpenSSL due to its incomplete fix for a 2019 CVE. Due to this, I disabled I was tracking this PR for Windows CA certificate store support. What is necessary now in OpenSSL to make use of this feature from curl? Do we still need |
Basically I don't know but: It looks like according to their CHANGES for OpenSSL 3.1 they've added curl tool reads SSL_CERT_DIR (note it's ignored for Schannel) and sets that as the path. I don't know if OpenSSL is now reading the environment itself but the URI is |
So it seems |
I really don't know. That was my impression. You may want to ask in the thread. |
None of the popular forks support this either. wolfSSL does however, seemingly also when using its OpenSSL-compatibility API, though I haven't tested it. |
These are two boolean options to ask curl to use the native OS's CA store when verifying TLS servers. For peers and for proxies respectively. They currently only have an effect for curl on Windows when built to use OpenSSL for TLS.
These are two boolean options to ask curl to use the native OS's CA store when verifying TLS servers. For peers and for proxies respectively. They currently only have an effect for curl on Windows when built to use OpenSSL for TLS. Closes curl#11049
These are two boolean options to ask curl to use the native OS's CA store when verifying TLS servers. For peers and for proxies respectively. They currently only have an effect for curl on Windows when built to use OpenSSL for TLS. Closes curl#11049
These are two boolean options to ask curl to use the native OS's CA store when verifying TLS servers. For peers and for proxies respectively.
They currently only have an effect for curl on Windows when built to use OpenSSL for TLS.