summaryrefslogtreecommitdiffstats
path: root/ipaserver/plugins/host.py
diff options
context:
space:
mode:
authorFraser Tweedale <ftweedal@redhat.com>2016-06-03 14:01:49 +1000
committerJan Cholasta <jcholast@redhat.com>2016-06-06 08:58:01 +0200
commitfa149cff86a67ebfe2739df6467a6e10e47742cd (patch)
tree9887c23afd822b69b71a901cd81e3834b1ce6532 /ipaserver/plugins/host.py
parent2026677635c6d4b086670cb9d8f3570bd1b95c27 (diff)
downloadfreeipa-fa149cff86a67ebfe2739df6467a6e10e47742cd.tar.gz
freeipa-fa149cff86a67ebfe2739df6467a6e10e47742cd.tar.xz
freeipa-fa149cff86a67ebfe2739df6467a6e10e47742cd.zip
Remove service and host cert issuer validation
When adding certifiates to a host or service entry, we currently check that the issuer matches the issuer DN of the IPA CA. Now that sub-CAs have been implemented, this check is no longer valid and will cause false negatives. Remove it and update call sites. Part of: https://fedorahosted.org/freeipa/ticket/4559 Reviewed-By: Jan Cholasta <jcholast@redhat.com>
Diffstat (limited to 'ipaserver/plugins/host.py')
-rw-r--r--ipaserver/plugins/host.py4
1 files changed, 0 insertions, 4 deletions
diff --git a/ipaserver/plugins/host.py b/ipaserver/plugins/host.py
index 709b78d5b..e59e0fa93 100644
--- a/ipaserver/plugins/host.py
+++ b/ipaserver/plugins/host.py
@@ -657,8 +657,6 @@ class host_add(LDAPCreate):
setattr(context, 'randompassword', entry_attrs['userpassword'])
certs = options.get('usercertificate', [])
certs_der = [x509.normalize_certificate(c) for c in certs]
- for cert in certs_der:
- x509.verify_cert_subject(ldap, keys[-1], cert)
entry_attrs['usercertificate'] = certs_der
entry_attrs['managedby'] = dn
entry_attrs['objectclass'].append('ieee802device')
@@ -869,8 +867,6 @@ class host_mod(LDAPUpdate):
# verify certificates
certs = entry_attrs.get('usercertificate') or []
certs_der = [x509.normalize_certificate(c) for c in certs]
- for cert in certs_der:
- x509.verify_cert_subject(ldap, keys[-1], cert)
# revoke removed certificates
if certs and self.api.Command.ca_is_enabled()['result']: