-
-
Notifications
You must be signed in to change notification settings - Fork 16
TLS certificate name check should depend on JID domain #113
Comments
Hmm... Thanks for reporting! |
Would an option for enabling this behavior be sufficient, or should UWPX, as soon as validation with the hostname (e.g. |
@KingKili any thoughts, if this could be exploited somehow? |
@ivucica the wird thing is, UWPX should not get stuck in the connecting state... And then upload the resulting |
I don't think so. I would even say that in most cases the certificate for jid domain should be the correct one. |
Cert. validation should be fixed and will be included in the next release. |
@ivucica feel free to reopen this/a new issue if you have logs for the other issue ;) |
Bevor you create a new issue:
I'm submitting a...:
Current behavior:
There are some awesome TLS options that I haven't otherwise seen in other clients (presumably because #28). Thanks!
However, I hardcoded name
somehostname.example.com
in place of having the client do SRV lookup onexample.com
for[email protected]
.I ended up with TLS cert not being accepted and having to turn hostname validation off.
I need to use
somehostname.example.com
as SRV lookup doesn't seem to work, possibly due to some IPs in the A or AAAA record not working? The client is stuck in the 'Unknown' state.Expected behavior:
TLS cert should probably be accepted even if it's an HTTP cert issued for
example.com
, if that's the domainpart of the JID.Minimal reproduction of the problem with instructions:
example.com
,www.example.com
andname.example.com
with Prosody.[email protected]
.ipv4only.example.com
as your hostname.example.com
.Environment:
The text was updated successfully, but these errors were encountered: