-
Notifications
You must be signed in to change notification settings - Fork 18
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. Weβll occasionally send you account related emails.
Already on GitHub? Sign in to your account
POC SSL Certificate #63
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Nice! The only problem I can see with the certificates not coming from a trusted authority is that you're still vulnerable to a man-in-the-middle you can't verify identity. I may well be wrong about that though - I'm not exactly a security expert. However, given our use case I don't think it's a big deal.
@bfbachmann I don't think that's a concern. Since the bootstrapping connection occurs over a secure channel we can inform the client of what cert the server has generated, so the client knows what it should trust. The cert does come from a trusted authority (our code, running on the server), but the library doesn't know that without some extra work on our part. That's the hard part. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Love it.
@@ -0,0 +1,6 @@ | |||
#!/bin/bash | |||
|
|||
openssl genrsa -out server.key 2048 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can we remove the dependency on openssl?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
May be of use https://godoc.org/github.com/spacemonkeygo/openssl
"net/http" | ||
) | ||
|
||
func HelloServer(w http.ResponseWriter, req *http.Request) { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hahaha damn this is simple π
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Does this mean the inertia [REMOTE]
commands have to be sudo now, or only once?
No @bobheadxi, this will be handled over SSH prior to and during booting of the daemon container π |
Unfortunately does not work for IP addresses.
β Status: WIP
ποΈ Ticket(s): #59
π¦ Testing Instructions
Elsewhere...
Produces server-side error:
@jordanschalm and I discuss:
Discuss?