You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Setting the option tls_require_and_verify_client_cert to true requires that the client cert you are using is signed by a CA present in the OS CA store. This seems unnecessary to me, I'd rather not have to update the OS CA store and would prefer to be able to use a certificate signed by the CA concatenated to the vault server certificate file. Would it be possible to implement this behaviour, possibly controlled by another configuration setting in the same listener section of the config file?
The text was updated successfully, but these errors were encountered:
paulcarlton
changed the title
use of unseal without token allows denial of service using reset
tls_require_and_verify_client_cert should not require CA loaded into OS CA store
May 10, 2017
I'm adding this to the 0.7.4 milestone but it may slip; we'll try to get it in by 0.8. If an interested party wanted to work on this it'd be pretty simple.
Setting the option tls_require_and_verify_client_cert to true requires that the client cert you are using is signed by a CA present in the OS CA store. This seems unnecessary to me, I'd rather not have to update the OS CA store and would prefer to be able to use a certificate signed by the CA concatenated to the vault server certificate file. Would it be possible to implement this behaviour, possibly controlled by another configuration setting in the same listener section of the config file?
The text was updated successfully, but these errors were encountered: