Symptoms
There is no way to perform a soft server certificate verification.
Impact
No way to perform a soft server certificate verification and continue the handshake as though the verification is OK, even if it is not OK.
Conditions
Server-side SSL forward proxy when 'server certificate is set to 'require' and 'untrusted CA response control' and 'expired certificate response control' are both set to 'ignore'.
Fix Information
There is a new sys db variable: tmm.ssl.servercert_softval with default value 'disabled'.
When this sys db variable is 'enabled', calling SSL::verify_result will return a soft verfiy_result value.
Typical use case:
It is used in the server-side SSL forward proxy when 'server certificate is set to 'require' and 'untrusted CA response control' and 'expired certificate response control' are both set to 'ignore' but would like to perform a soft server certificate verification.
Behavior Change
There is a new sys db variable: tmm.ssl.servercert_softval with default value 'disabled'.
When this sys db variable is 'enabled', calling SSL::verify_result will return a soft verfiy_result value.
Typical use case:
It is used in the server-side SSL forward proxy when 'server certificate is set to 'require' and 'untrusted CA response control' and 'expired certificate response control' are both set to 'ignore' but would like to perform a soft server certificate verification.