Do not require admin for CA or CRL on Windows SChannel

XMLWordPrintableJSON

    • Type: Improvement
    • Resolution: Unresolved
    • Priority: Minor - P4
    • None
    • Affects Version/s: None
    • Component/s: None
    • None
    • None
    • C Drivers
    • None
    • None
    • None
    • None
    • None
    • None

      Request Do not require elevated privileges to handle CA and CRL files for Windows Secure Channel.

      Background

      Windows Secure channel handles the option mongoc_ssl_opt_t::ca_file (equivalently the URI option tlsCAFile) and mongoc_ssl_opt_t::crl_file options by importing them into the System Local Machine Store.

      This has the consequence of requiring elevated privileges. As noted in this comment running as a non-admin user resulted in:

      Error opening certificate store: (0x00000005) Access is denied.
      

      The server appears to instead use a memory store. I expect the C driver could do similar to avoid requiring extra privileges.

      Motivation I expect this is low priority. This was discovered internally. Importing has used the local machine certificate store since introduced. And if a user is unable to run with elevated privileges, they can import the CA / CRL using a separate tool (e.g. certmgr)

              Assignee:
              Unassigned
              Reporter:
              Kevin Albertson
              Votes:
              0 Vote for this issue
              Watchers:
              1 Start watching this issue

                Created:
                Updated: