On Tue, 2018-06-26 at 01:19 -0700,
vl...@jhmi.edu wrote:
> W0626 01:15:14.168662 HttpClient.cpp:686] HTTPS will use the CA
> certificates from this file: /etc/orthanc/
>
> It looks a bit worrisome to me as my SslCertificate property in the
> configuration file is set to "/etc/orthanc/certificate.pem", so
> shouldn't it be read as:
>
> W0626 01:15:14.168662 HttpClient.cpp:686] HTTPS will use the CA
> certificates from this file: /etc/orthanc/certificate.pem
This log output line relates to the HTTP client, not the server. This
implies the path in question is used to search for many certificates
for CAs (certificate authorities) for Orthanc to use in order to verify
peers (other TLS-enabled servers it connects to). This is controlled
with the HttpsCACertificates setting, not SslCertificate.
https://bitbucket.org/sjodogne/orthanc/src/78e5414d57f8874cfe88997726b9
7bd3b25e48df/OrthancServer/main.cpp#lines-981
https://bitbucket.org/sjodogne/orthanc/src/78e5414d57f8874cfe88997726b9
7bd3b25e48df/Core/HttpClient.cpp#lines-678
> Also, should certificate.pem also include certificates for the
> intermediate servers?
Technically (and depending on the freedom offered by client tooling)
it's not strictly necessary. In general however, I'd say yes. You want
to keep the trusted roots small to avoid churn since most clients
typically don't update it often enough. If you have control over both
the clients and the server, I'd say it doesn't really matter (but then
you might as well just use a self-signed cert and check the
fingerprints).
--
Thibault Nélis <
t...@osimis.io>
Osimis