-
Notifications
You must be signed in to change notification settings - Fork 18k
crypto/x509: root_cgo_darwin and root_nocgo_darwin omit some system certs [1.11 backport] #26039
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Approved since this is a security patch. Please follow the instructions at https://github.com/golang/go/wiki/MinorReleases to create the cherrypick CL. I will defer to @FiloSottile as to which CLs should be backported. |
Moving to Go 1.10.6 milestone as this isn't ready for 1.10.5. |
I want this to get tested in beta before backporting it, so I expect it will not reach 1.10, but only 1.11 later on. |
@FiloSottile any updates on beta testing? Should this still be be backported? |
I'd like this to bake maybe another week before backporting, also because I'll get to talk with Apple engineers at RWC. |
@FiloSottile, any new information (from the beta or from Apple) to inform the backport decision? |
Ping |
@FiloSottile ping. It has definitely been a week of bake-in time for this. Want this cherrypicked into 1.11 now? |
@katiehockman yes, I feel good enough about this now. I'm thinking we don't need it in 1.10 after all though. I'll close the 1.10 issue and make the 1.11 cherry-pick. |
Thanks! I'll change the status to approved then. |
Change https://golang.org/cl/162860 mentions this issue: |
Change https://golang.org/cl/162861 mentions this issue: |
Closed by merging 688dc85 to release-branch.go1.11. |
Closed by merging 3705d34 to release-branch.go1.11. |
…(cgo path) The cgo path was not taking policies into account, using the last security setting in the array whatever it was. Also, it was not aware of the defaults for empty security settings, and for security settings without a result type. Finally, certificates restricted to a hostname were considered roots. The API docs for this code are partial and not very clear, so this is a best effort, really. Updates #24652 Updates #26039 Change-Id: I8fa2fe4706f44f3d963b32e0615d149e997b537d Reviewed-on: https://go-review.googlesource.com/c/128056 Run-TryBot: Filippo Valsorda <filippo@golang.org> TryBot-Result: Gobot Gobot <gobot@golang.org> Reviewed-by: Adam Langley <agl@google.com> Reviewed-by: Adam Langley <agl@golang.org> (cherry picked from commit f6be1cf) Reviewed-on: https://go-review.googlesource.com/c/162860 Reviewed-by: Andrew Bonventre <andybons@golang.org>
…(no-cgo path) Certificates without any trust settings might still be in the keychain (for example if they used to have some, or if they are intermediates for offline verification), but they are not to be trusted. The only ones we can trust unconditionally are the ones in the system roots store. Moreover, the verify-cert invocation was not specifying the ssl policy, defaulting instead to the basic one. We have no way of communicating different usages in a CertPool, so stick to the WebPKI use-case as the primary one for crypto/x509. Updates #24652 Fixes #26039 Change-Id: Ife8b3d2f4026daa1223aa81fac44aeeb4f96528a Reviewed-on: https://go-review.googlesource.com/c/128116 Reviewed-by: Adam Langley <agl@google.com> Reviewed-by: Adam Langley <agl@golang.org> (cherry picked from commit aa24158) Reviewed-on: https://go-review.googlesource.com/c/162861 Run-TryBot: Filippo Valsorda <filippo@golang.org> TryBot-Result: Gobot Gobot <gobot@golang.org> Reviewed-by: Andrew Bonventre <andybons@golang.org>
@FiloSottile requested issue #24652 to be considered for backport to the next 1.10 minor release.
The text was updated successfully, but these errors were encountered: