Skip to content
This repository has been archived by the owner on Jan 24, 2019. It is now read-only.

Added support for self-signed SSL certificates #234

Closed
wants to merge 3 commits into from

Conversation

omazhary
Copy link

No description provided.

Omar Elazhary added 3 commits July 4, 2016 16:46
* Added a new flag "enable-insecure" to specify whether or not the proxy should allow insecure SSL connections/requests.
* Implemented that functionality for the generic provider which applies in turn to all of them.
@omazhary
Copy link
Author

omazhary commented Jul 4, 2016

Branch rebased and ready for merging.

@jehiah
Copy link
Member

jehiah commented Jul 4, 2016

@omazhary can you describe your motivations for Self-signed cert capability?

@omazhary
Copy link
Author

omazhary commented Jul 4, 2016

It's only for development environments where no one uses CA signed certs. However, once it goes productive, SSL (strict) gets re-enabled.

@jehiah
Copy link
Member

jehiah commented Jul 4, 2016

@omazhary so you are trying to set InsecureSkipVerify just for the upstream proxied requests? Asking because as written this would also make all communication w/ an authentication provider insecure.

@omazhary
Copy link
Author

omazhary commented Jul 5, 2016

@jehiah nope, all requests should be insecure. If the upstream resource has a self-signed cert, it doesn't work. The same happens with the authentication provider.

For instance, we're testing this with grafana as an upstream resource, and using cloudfoundry's UAA as an authentication provider (hence PR #207). In our dev environments, https is enabled and we use self-signed certs. It makes no sense to invest in CA signed certs for development purposes. However, once the end result gets shipped to a productive environment, strict SSL (overall) is used. Meaning, both the upstream resource as well as the authentication provider are using CA signed certs.

That's why I thought it would make sense to have such an option, to be able to switch it on and off as needed based on your use case.

@jehiah
Copy link
Member

jehiah commented Jul 5, 2016

Thanks. Helpful context. One last question, Did you evaluate l valid free certs through lets encrypt or startcom? I understand the desire not to pay for development certificates but I'm on the fence here because I am concerned about insecure production configurations.

https://letsencrypt.org
https://www.startssl.com

@omazhary
Copy link
Author

omazhary commented Jul 5, 2016

We did, but since our dev environment is internal, and can't be reached externally, it didn't seem necessary.
Feel free to take a look: cloud foundry development.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Development

Successfully merging this pull request may close these issues.

2 participants