-
Notifications
You must be signed in to change notification settings - Fork 102
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Include the root certificate? #46
Comments
Thanks for the issues @rgl! Including the root from the verified chain sounds like a good idea to me. |
My idea was to include all the certificates from
Because the number of certificates will now account for the certificates in all verified chains, not just a single one. I'm seeing a couple of possibilities:
|
If I understand it correctly,
As it's a separate metric, for a separate thing, I don't see a problem with it duplicating certificates that may appear in the peer certificates.
Perhaps we could order the chains by the length of their validity. For instance, 0 would be the chain that will be valid for the longest and therefore |
Ordering the chain like you mentioned sounds good too. But I'm not sure if that is what is already being done by the go TLS stack. Anyways, I guess we should have tests for that :-) BTW, if I understood correctly, blackbox_exporter is not working like what you've described. It seems to be returning the certificate that expires the soonest among all the chains. Which leaves me wondering why its doing that. |
prometheus/blackbox_exporter#681 - I think it's a bug. |
See: #48 |
Currently ssl_exporter is generating a metric over each PeerCertificates.
It would be useful to also include the root certificates (i.e. full chain), something akin to what the blackbox_exporter does.
What do you think?
The text was updated successfully, but these errors were encountered: