crypto/tls: mention in the InsecureSkipVerify docs that it's ok to use with Verify callbacks #39074
Labels
Documentation
FrozenDueToAge
NeedsInvestigation
Someone must examine and confirm this is a valid issue and not a duplicate of an existing one.
Hi Go team,
Our teams(security team and gRPC-Go team) are working on a project that might need to set the field 'InsecureSkipVerify' to true to enable 'VerfiyPeerCertificate' in tls.config. However, according to the comments,
we are a bit hesitant to set
InsecureSkipVerify
to true, since it is going to be used in production code. So my questions are:if we set
InsecureSkipVerify
to true but provide proper endpoint verification mechanisms other than the default hostname check, can it be used in the real environment?If the answer to the first question is "yes", can we improve the comments a little bit? If that's the case, "used only for testing" might be a bit misleading.
Thank you so much for the help!
@FiloSottile
The text was updated successfully, but these errors were encountered: