-
Notifications
You must be signed in to change notification settings - Fork 616
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Is there a way to prevent SSL requests falling back to an unrelated cert? #138
Comments
The current behavior is to serve the first certificate if none matched since this matches the TLS behavior of the Go stdlib. I can add that. Shouldn't be difficult. |
@far-blue I am wondering whether the |
I would say it's prob. a property of the listener as the cert source is all about fetching certs while the listener is all about serving them. I'd prob. opt for |
@far-blue I tend to agree on both. The only issue with I can't think of a better name which expresses this in a different way.
|
well, if you are talking about the code vs the config, you could present the config as |
I like |
The default behavior of the Go TLS server implementation is to fall back to the first provided certificate if no exact matching certificate could be found. It can be desirable to disable this behavior to have more control over when a TLS connection is established. This patch adds a 'strictmatch' option to the listener which allows to disable the default fallback behavior. TODO(fs): need test for new getCertificate() function
Still need to add a test for |
@far-blue thx for your help |
The default behavior of the Go TLS server implementation is to fall back to the first provided certificate if no exact matching certificate could be found. It can be desirable to disable this behavior to have more control over when a TLS connection is established. This patch adds a 'strictmatch' option to the listener which allows to disable the default fallback behavior.
The default behavior of the Go TLS server implementation is to fall back to the first provided certificate if no exact matching certificate could be found. It can be desirable to disable this behavior to have more control over when a TLS connection is established. This patch adds a 'strictmatch' option to the listener which allows to disable the default fallback behavior.
I'll sleep over the |
The default behavior of the Go TLS server implementation is to fall back to the first provided certificate if no exact matching certificate could be found. It can be desirable to disable this behavior to have more control over when a TLS connection is established. This patch adds a 'strictmatch' option to the listener which allows to disable the default fallback behavior.
Merged to master. |
great! thanks :) |
I'm playing with vault certs and I've noticed that if I've only supplied SSL certs for some of the hosts fabio is proxying then those without certs can still be served via the HTTPS proxy but will serve with one of the other host's SSL certs. I'm not sure of which one is picked but I guess it might be the first or last one fabio loads from vault.
I'd prefer not to serve invalid certs for services, even accidentally, so is there an option to reject the connection if there is no matching cert?
The text was updated successfully, but these errors were encountered: