A commit in v1.14 changed the certificate chain trust mode from X509ChainTrustMode.System to X509ChainTrustMode.CustomRootTrust in VerifyRemoteCertificate. This breaks certificate validation for certificates with intermediate CA chains that previously worked.
Certificates with intermediate certificate chains fail validation in v1.14. Previously, these certificates validated successfully using the Windows certificate store (X509ChainTrustMode.System). Now With CustomRootTrust, there is currently no mechanism to provide intermediate certificates to the validation chain. Validation always fails because the full certificate chain cannot be resolved
We would like either:
Support a way to supply intermediate certificates for CustomRootTrust validation,
or
Revert to using X509ChainTrustMode.System
or
any other fix that would allow us to use certificates as before
Affected version: v1.14
A commit in v1.14 changed the certificate chain trust mode from X509ChainTrustMode.System to X509ChainTrustMode.CustomRootTrust in VerifyRemoteCertificate. This breaks certificate validation for certificates with intermediate CA chains that previously worked.
Certificates with intermediate certificate chains fail validation in v1.14. Previously, these certificates validated successfully using the Windows certificate store (X509ChainTrustMode.System). Now With CustomRootTrust, there is currently no mechanism to provide intermediate certificates to the validation chain. Validation always fails because the full certificate chain cannot be resolved
We would like either:
Support a way to supply intermediate certificates for CustomRootTrust validation,
or
Revert to using X509ChainTrustMode.System
or
any other fix that would allow us to use certificates as before
Affected version: v1.14