-
Notifications
You must be signed in to change notification settings - Fork 254
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
how to specify server CA, client cert and client key when connecting to wss server? #44
Comments
So I found that myself, may it be helpful to others (I have to disable server certificate verification at the moment, as I get an "E certificate is valid but its commonName does not match hostname"):
|
Yes, Anyway I'll count this issue as a vote to implement this feature natively. |
When you might be getting at this in the future, please give some love also to the |
Do you mean the name for SNI or the name in the server certificate to check? |
As far as I understand the situation with respect to the Kubernetes remote API, this is about the server certificate returned during SSL handshake and checking it against the server's CA certificate the client has. |
In order to connect to a websocket service inside a pod in a minikube setup, I need to address the Kubernetes remote API which then demands a client certificate (
~/.minikube/client.crt
and~/.minikube/client.key
). I also have the server's CA (~/.minikube/ca.crt
).curl
allows to use these certs with the--cert
,--key
, and--cacert
options.Does
websocat
also support specifying the client cert and the server CA when accessing awss://
URL?The text was updated successfully, but these errors were encountered: