summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorDaniel Stenberg <daniel@haxx.se>2021-02-05 10:50:51 +0100
committerDaniel Stenberg <daniel@haxx.se>2021-02-05 23:56:47 +0100
commit82551c1308321272d95a2d7b9bf15d03e99fbf43 (patch)
tree7f798c2b8e9e3fff9cdbacaddead4334bdfca89d
parent666743a204ff92fc3368f656d52862a11dfa397b (diff)
downloadcurl-82551c1308321272d95a2d7b9bf15d03e99fbf43.tar.gz
docs/SSL-PROBLEMS: enhanced
Elaborate on the intermediate cert issue, and mention that anything below TLS 1.2 is generally considered insecure these days. Closes #6572
-rw-r--r--docs/SSL-PROBLEMS.md17
1 files changed, 14 insertions, 3 deletions
diff --git a/docs/SSL-PROBLEMS.md b/docs/SSL-PROBLEMS.md
index cd17cd615..bc3c1d52c 100644
--- a/docs/SSL-PROBLEMS.md
+++ b/docs/SSL-PROBLEMS.md
@@ -23,8 +23,18 @@
## CA bundle missing intermediate certificates
When using said CA bundle to verify a server cert, you will experience
- problems if your CA cert does not have the certificates for the
- intermediates in the whole trust chain.
+ problems if your CA store does not contain the certificates for the
+ intermediates if the server doesn't provide them.
+
+ The TLS protocol mandates that the intermediate certificates are sent in the
+ handshake, but as browsers have ways to survive or work around such
+ omissions, missing intermediates in TLS handshakes still happen that
+ browser-users won't notice.
+
+ Browsers work around this problem in two ways: they cache intermediate
+ certificates from previous transfers and some implement the TLS "AIA"
+ extension that lets the client explictly download such cerfificates on
+ demand.
## Protocol version
@@ -36,7 +46,8 @@
An additional complication can be that modern SSL libraries sometimes are
built with support for older SSL and TLS versions disabled!
- All versions of SSL are considered insecure and should be avoided. Use TLS.
+ All versions of SSL and the TLS versions before 1.2 are considered insecure
+ and should be avoided. Use TLS 1.2 or later.
## Ciphers