Provide an ability to ignore invalid (self-signed) certificate per host for federation #834
Labels
No labels
Bug
Cherry-picking
Database
Dependencies
Dependencies/Renovate
Difficulty
Easy
Difficulty
Hard
Difficulty
Medium
Documentation
Enhancement
Good first issue
Help wanted
Inherited
Matrix/Administration
Matrix/Appservices
Matrix/Auth
Matrix/Client
Matrix/Core
Matrix/Federation
Matrix/MSC
Matrix/Media
Meta
Meta/Packaging
Priority
Blocking
Priority
High
Priority
Low
Security
Status
Confirmed
Status
Duplicate
Status
Invalid
Status
Needs Investigation
Wont fix
old/ci/cd
old/rust
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: continuwuation/continuwuity#834
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
So far, the only use case for this that I see is the ability to mix globalnet, and overlays/altnets when it's either difficult to get a proper certificate or simply impossible, Probably the ideal way to do that would be to provide an option within
[[global.proxy.by_domain]]
to ignore invalid certificates.Related: Add config option for ignoring TLS validation for certain domains/wildcarded domains, but I proposed a potentially different solution, but however I'm not fully aware of its security implications.
Generally-speaking the ability to either skip validation or trust TLS certificates would make running non-IP-based overlays (e.g. tor, i2p) easy. also to note any IP-based overlays (e.g. Yggdrasil, Mycelium) doesn't really need this feature as they can piggyback off clearnet DNS domains, but in the case if somebody would run a DNS server within those overlays, it'd become once again impossible to get a certificate.