Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

relp tls fingerprint authentication #25

Open
jeanpaulgalea opened this issue Mar 24, 2016 · 0 comments
Open

relp tls fingerprint authentication #25

jeanpaulgalea opened this issue Mar 24, 2016 · 0 comments

Comments

@jeanpaulgalea
Copy link

Would you consider adding a feature to match tls.permittedpeer fingerprints with hostnames?

Currently if you have a list of peers using omrelp to write to a "master" node, which is using imrelp and tls.authmode="fingerprint" with a list of tls.permittedpeer fingerprints, any client peer can masquerade as any other client.

To avoid this we can check if $hostname and $fromhost-ip match, but it would be more robust to check against the fingerprint.

Maybe it's possible to populate a $fingerprint variable with the connection's TLS fingerprint?

Or have a hash for tls.permittedpeer with hostname -> fingerprint to automatically drop messages (or log separately perhaps) for hostname/fingerprint mismatch?

Thanks.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant