Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

tls_require_and_verify_client_cert should not require CA loaded into OS CA store #2708

Closed
paulcarlton opened this issue May 10, 2017 · 2 comments
Milestone

Comments

@paulcarlton
Copy link

Setting the option tls_require_and_verify_client_cert to true requires that the client cert you are using is signed by a CA present in the OS CA store. This seems unnecessary to me, I'd rather not have to update the OS CA store and would prefer to be able to use a certificate signed by the CA concatenated to the vault server certificate file. Would it be possible to implement this behaviour, possibly controlled by another configuration setting in the same listener section of the config file?

@paulcarlton paulcarlton changed the title use of unseal without token allows denial of service using reset tls_require_and_verify_client_cert should not require CA loaded into OS CA store May 10, 2017
@jgalas-jc
Copy link

The parameter in configuration file (like tls_ca_file or tls_ca_path) would be nice.

@jefferai jefferai added this to the 0.7.4 milestone Jun 14, 2017
@jefferai
Copy link
Member

I'm adding this to the 0.7.4 milestone but it may slip; we'll try to get it in by 0.8. If an interested party wanted to work on this it'd be pretty simple.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants