Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add control option to determine whether self-signed certificate can pass verification #133

Open
haosanzi opened this issue Dec 19, 2022 · 0 comments

Comments

@haosanzi
Copy link
Contributor

It is indeed unreasonable for both ends of rats-tls to use self-signed certificates by default.

For the self-signed certificate in the mtls scenario. If the other party is in a non-tee environment, as a verifier, it will naturally return a self-signed certificate. However, if the programs on both sides of the integrated rats-tls are placed on the public network, they will receive any benevolent or malicious requests. If a malicious verifier and attester do mtls, it means that the attester has approved the self-signed certificate sent by the other party.
Even if it is really recognized, it should not be the default behavior, because under normal circumstances, the verifier also has a certificate issued by a legal CA, not a self-signed certificate. The verifier self-signed certificate is only present in the test environment.

So this block should have a control option to determine whether the self-signed certificate can pass the verification.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant