-
-
Notifications
You must be signed in to change notification settings - Fork 180
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ssl auto upgrade #3313
Comments
Done in the commit above.
Example output:
|
No longer enabled by default because this causes TCP connections to servers with self-signed certificates to upgrade to SSL, then fail because the certificate is not "valid". |
We could detect self-signed certs and refuse to auto-upgrade in that case: SO: Determine if SSL certificate is self signed using Python |
why not instead do it the ssh way and keep a list of known-good servers that may authenticate themselves using a ssc? in SSH, connecting to a previously-unknown server displays its hostname, its host key fingerprint and if approved, adds it to .ssh/known-hosts. if the host key ever changes, ssh will throw big red warnings at the user. i propose doing the same for ssl certs, let the user accept that this is lower security than a CA-signed cert, but still have their back wrt to changing certs. Overall, blindly trusting a self-signed cert is better for security than simply not upgrading, because having a self-signed cert still means the traffic is encrypted in-flight. |
We already do that for SSL connections, it just isn't wired up for upgraded connections. |
Expanding the scope of #3299, the server can tell the client that it supports ssl and then the client may decide to upgrade the tcp or ws socket to ssl / wss.
See also #3305
The text was updated successfully, but these errors were encountered: