Add config option for ignoring TLS validation for certain domains/wildcarded domains #108
Labels
No labels
Bug
Cherry-picking
Database
Dependencies
Dependencies/Renovate
Difficulty
Easy
Difficulty
Hard
Difficulty
Medium
Documentation
Enhancement
Good first issue
Help wanted
Inherited
Matrix/Administration
Matrix/Appservices
Matrix/Auth
Matrix/Client
Matrix/Core
Matrix/Federation
Matrix/MSC
Matrix/Media
Meta
Meta/Packaging
Priority
Blocking
Priority
High
Priority
Low
Security
Status
Confirmed
Status
Duplicate
Status
Invalid
Status
Needs Investigation
Wont fix
old/ci/cd
old/rust
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: continuwuation/continuwuity#108
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Conduit supports SOCK5 proxies so allowing users to exclude TLS verification from
*.onion
can enable both clearnet + Tor federation at the same time.This MR isn't going anywhere, been open for 2 years, stalled on weird pedantic discussions about MITM and TLS, and the design of how it works still requires onion operators to generate a TLS certificate for themselves which is completely pointless on Tor, so it doesn't achieve anyone's goals other than some weird obscure setup where you Tor federation only with operators who generate an invalid self-signed TLS certificate (aka no one). This MR only allows trusting certificates, not ignoring certificate/TLS validation.
Basically how Synapse's
federation_certificate_verification_whitelist
works but with a bit more safety and verbosity when it's in use. For example, don't let the user exclude everything"*"
, log at least warn on startup when it's in use every time, and only allow the user to wildcard exclude known protocols like I2P and Tor.Alternatively, I could just merge the two ideas together for the best security and usability compromise: Only allow disabling TLS verification on known protocols like I2P and Tor, and allow user to trust (but not disable) certificates from domains/subdomains but not entire TLDs for things like an internal federation setup using a private CA. User should be allowed to do either of these on known reserved local TLDs like
.home.arpa
,.local
, and.localhost
.So with this setup:
*.onion
(don't attempt to validate or connect over TLS) and*.home.arpa
*.local
and*.corp.girlboss.ceo
but still expect TLS*
or*.com
*.net
or*
Sounds quite convoluted but this is likely the best way to do it with minimal risk. No priority because this is pretty niche.