3.2.3.5. Certificate verification options

Zorp is able to automatically verify the certificates received. The types of accepted certificates can be controlled separately on the client and the server side using the ssl.client_verify_type and the ssl.server_verify_type attributes. These attributes offer an easy way to restrict encrypted access only to sites having trustworthy certificates. The available options are summarized in the following table.

NameValue
TLS_TRUST_LEVEL_NONEAccept invalid for example, expired certificates.
TLS_TRUST_LEVEL_UNTRUSTEDBoth trusted and untrusted certificates are accepted.
TLS_TRUST_LEVEL_FULLOnly valid certificates signed by a trusted CA are accepted.

Table 3.2.  Constants for trust level selection.

The ssl.server_check_subject can be used to compare the domain name provided in the Subject field of the server certificate to application level information about the server. Currently it can compare the Subject field to the domain name of the HTTP request in HTTPS communication. If the ssl.server_check_subject is set to TRUE and ssl.server_verify_type is SSL_VERIFY_REQUIRED_UNTRUSTED or SSL_VERIFY_REQUIRED_TRUSTED, the HTTP proxy using the SSL framework will deny access to the page and return an error if the Subject field does not match the domain name of the URL.