Skip to content

Commit

Permalink
Fix readme wording
Browse files Browse the repository at this point in the history
Was referring to CN/OU, but we also support SAN checks.
  • Loading branch information
csstaub committed Mar 7, 2016
1 parent 857e74c commit 392149f
Showing 1 changed file with 7 additions and 6 deletions.
13 changes: 7 additions & 6 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -25,8 +25,9 @@ Features

***Authentication/access control***: Ghostunnel enforces mutual authentication
by always requiring a valid client certificate. We also support access control
via checks of the CN/OU fields on the subject of a client certificate. This is
useful for restricting access to services that don't have native access control.
via checks on the subject (or subject alternative names) of a client certificate.
This is useful for restricting access to services that don't have native access
control.

***Certificate hotswapping***: Ghostunnel can reload certificates at runtime
without dropping existing connections. To trigger a reload, simply send
Expand All @@ -35,15 +36,15 @@ files and open a new listening socket (via `SO_REUSEPORT`). Once successful,
the old listening socket will be closed.

***Automatic reloading***: Ghostunnel can be configured to automatically reload
certificates. You can specify an interval with the `--timed-reload` flag. If
certificates. You can specify an interval with the `--timed-reload` flag. If
the timed reload flag is enabled, ghostunnel will reload the files periodically
and check for changes. If a change is detected, it will attempt to reload the
listener with the new certificates/private key.

***Emphasis on security***: We have put some thought into making ghostunnel
secure by default. In server mode, the target connection must live on localhost
or a UNIX socket (unless `--unsafe-target` is specified). In a similar way, in
client mode the listening socket must live on localhost or a UNIX socket
secure by default. In server mode, the target backend must live on localhost
or be a UNIX socket (unless `--unsafe-target` is specified). In a similar way,
in client mode the listening socket must live on localhost or be a UNIX socket
(unless `--unsafe-listen` is specified). Ghostunnel negotiates TLSv1.2
and uses safe ciphers.

Expand Down

0 comments on commit 392149f

Please sign in to comment.