-
Notifications
You must be signed in to change notification settings - Fork 44
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Deployment: Design and recommendation for production deployment #100
Comments
Proposed deployment pattern: https://github.com/zigbee-alliance/distributed-compliance-ledger/blob/master/docs/deployment.png |
I believe we can start with the following items:
|
Current Design Notes: https://github.com/zigbee-alliance/distributed-compliance-ledger/wiki/DCL-MainNet-Deployment Answers for the questions above
Things to be checked/experimented (@andkononykhin):
|
TLS 1.3 is supported for Tendermint RPC only, verified with self-signed generated cert $ openssl ecparam -genkey -name secp384r1 -out server.key
$ openssl req -new -x509 -sha256 -key server.key -out server.crt -days 3650
$ # ... start a node with server.key and server.crt provided
$ curl -Lv --cacert tmp/server.crt https://localhost:26657/
* Trying 127.0.0.1:26657...
* TCP_NODELAY set
* Connected to localhost (127.0.0.1) port 26657 (#0)
* ALPN, offering h2
* ALPN, offering http/1.1
* successfully set certificate verify locations:
* CAfile: tmp/server.crt
CApath: /etc/ssl/certs
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
* TLSv1.3 (IN), TLS handshake, Server hello (2):
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
* TLSv1.3 (IN), TLS handshake, Certificate (11):
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
* TLSv1.3 (IN), TLS handshake, Finished (20):
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
* TLSv1.3 (OUT), TLS handshake, Finished (20):
* SSL connection using TLSv1.3 / TLS_AES_128_GCM_SHA256
* ALPN, server accepted to use h2
* Server certificate:
* subject: C=AU; ST=Some-State; O=Internet Widgits Pty Ltd
* start date: Feb 4 10:22:52 2022 GMT
* expire date: Feb 2 10:22:52 2032 GMT
* SSL: unable to obtain common name from peer certificate
* Closing connection 0
* TLSv1.3 (OUT), TLS alert, close notify (256):
curl: (60) SSL: unable to obtain common name from peer certificate
More details here: https://curl.haxx.se/docs/sslcerts.html
curl failed to verify the legitimacy of the server and therefore could not
establish a secure connection to it. To learn more about this situation and
how to fix it, please visit the web page mentioned above. for both cosmos gRPC and cosmos REST (over gRPC) only HTTP is available, looks like they don't consider that as part of the cosmos's codebase (cosmos/cosmos-sdk#6420 (comment)) |
TLS (client part):
|
Acceptance criteria:
Links
The text was updated successfully, but these errors were encountered: