-
Notifications
You must be signed in to change notification settings - Fork 7
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix: have ssl handshake check hostname #283
Conversation
We need to hold off on this until PSC DNS is populated in all existing certificates. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM, this is also good to merge in now that the PSC DNS is in all existing certificates
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This looks perfectly correct, but obviously is missing something. Thanks for all the work on this @jackwotherspoon .
Via @jackwotherspoon
|
TLDR; For |
Going to close this for now. We'll need to revisit some server settings I think. |
For Cloud SQL we need to disable checking hostname of ssl handshake because IP address does not match SAN. However, for AlloyDB this is not the case and the IP address can be validated as the host name.
Fixes #324