it should always be an intermediate CA that issues the LDAP server's certificate. Therefore, the intermediate CA certificate would need to be imported
The following extensions are non standard, Netscape specific and largely obsolete. Their use in new applications is discouraged.Netscape String extensions.Netscape Comment (nsComment) is a string extension containing a comment which will be displayed when the certificate is viewed in some browsers.
> Netscape Comment:And people still rely on this mechanic?
And isn't the problem simply that the LDAP server does not return its intermediate where the new compat settings needs to be enabled?Cheers,Franco
I'm sorry, but how does the second follow from the first? you say that trust is related to whether the CA is offline or online?Im using offline root CA and M$ Enterprise subordinate CAs to issue certificates to services. and I always trust only the root CA (including OPNsense, including LDAP).what am I doing wrong?)
And isn't the problem simply that the LDAP server does not return its intermediate where the new compat settings needs to be enabled? [Emphasis mine]
opnsense defines a certificate as root CA cert if it is self-signed. as a self-signed, in turn, it defines a certificate that does not have Authority Key Identifier or if Authority Key Identifier is equal to Subject Key Identifier.
The fact the root is offline is coincidental to my argument
the root and subordinate CA certs should both be imported to ensure that the entire chain of trust is available
I believe Franco alludes to this when he says
CA certs should both be imported to ensure that the entire chain of trust is available
I'm sure would be read as an opportunity by certain developers to cut corners
I believe it's still the recommendation of many providers to import the whole certificate chain on clients
any Intermediate CA should be imported into System: Trust: Certificates ...I think this would mitigate the risk you mentioned (and provide another level of protection), yes...?
I cannot say I recall ever witnessing "unpredictable consequences" of importing intermediate CA certs into trusted stores
you can search for Lets Encrypt issues last monthor you can import outdated intermediate cert to trust store (say LE again) and try to curl something (say letsencrypt.org)
hm..given the fact that the certificates from the System: Trust: Certificates are not flushed into the trusted store? Certainly )
opnsense-patch 898c1d5
Thank you, that worked