Skip to content

Conversation

@ianic
Copy link
Contributor

@ianic ianic commented Oct 17, 2025

Fixes: #25606

Browsers and curl ignore extra irrelevant certificates in the chain.

This fix skips certificate which is not part of the chain. Remaining certificates still form an unbroken chain of signatures with the last one trusted by root CA.

Some other domain which also have extra certificates in the chain:

  • jhu.edu
  • last.fm
  • terra.com.br

Fixes: 25606

Browsers and curl ignore extra irrelevant certificates in the chain.

This fix skips certificate which is not part of the chain. Remaining
certificates still form an unbroken chain of signatures with the
last one trusted by root CA.

Some other domain which also have extra certificates in the chain:
 - jhu.edu
 - last.fm
 - terra.com.br
Copy link
Contributor

@jedisct1 jedisct1 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM!

@ctz
Copy link

ctz commented Oct 27, 2025

It may be worth reading https://medium.com/@sleevi_/path-building-vs-path-verifying-the-chain-of-pain-9fbab861d7d6 and deciding whether to do path building rather than this. Note that full path building is required by TLS1.3 (ref https://datatracker.ietf.org/doc/html/rfc8446#section-4.4.2, the paragraph beginning "Note: Prior to TLS 1.3")

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

std.http.Client.fetch fail with error.CertificateIssuerMismatch for valid domain

3 participants