Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Allow pinned device certs without a registered CA #839

Merged
merged 1 commit into from
Jul 1, 2022
Merged

Conversation

jjcarstens
Copy link
Collaborator

Fixes #838

We were previously requiring that the signer CA to be registered even if the
device certificate was already pinned, which was incorrect. This fixes that to
skip the check if we're being presented with a signer CA so that validation of the
device certificate can happen.

If the device cert is pinned, the check will pass. If not, it will go through the
normal validation flow and fail due to an expired, unregistered signer CA anyway

Fixes #838

We were previously requiring that the signer CA to be registered even if the
device certificate was already pinned, which was incorrect. This fixes that to
skip the check if we're being presented with a signer CA so that validation of the
device certificate can happen.

If the device cert is pinned, the check will pass. If not, it will go through the
normal validation flow and fail due to an expired, unregistered signer CA anyway
@jjcarstens jjcarstens requested a review from dnrce July 1, 2022 17:18
@jjcarstens jjcarstens merged commit 9d4d6ad into main Jul 1, 2022
@jjcarstens jjcarstens deleted the certs-no-ca branch July 1, 2022 21:04
@dnrce
Copy link
Contributor

dnrce commented Jul 1, 2022

Thanks, folks!!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Known devices with expired CAs can no longer connect
3 participants