-
Notifications
You must be signed in to change notification settings - Fork 49
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
bug: wakucanary requires key path to test client connections #2349
Comments
Related to #1732 |
@chair28980 please, what's the "Icebox" status and is there any chance to give this a higher prio? Given https://github.com/status-im/infra-hq/issues/92#issue-1769478385. |
Cc @waku-org/nwaku-developers please see above |
As discussed, WSS is not defined as a client-server protocol (even more with the P2P case), so it's reasonable that The proposed solution is for WakuCanary to generate self signed certificates in case none is provided and establish the connection. |
What? I'm sorry but I'm confused. My understanding is that Secure WebSockets, or If you're saying I can just use any "snakeoil" certificate and key with the Waku canary for |
Yes, apologies, my previous comment wasn't really accurate 😶 So the way Waku Canary works is creating a Waku node, adding the node we want to check as a peer, connecting to it and verifying which protocols it supports. If we would try to connect to the node via a "normal" WSS client and not via a libp2p node, then we wouldn't need the certificate. But because we do it via a |
I see, thanks for explaining the confusion. So we can just generate any certificate and key for the canary host and use that for all canaries checking websocket port status. Cool. |
Problem
The
wakucanary
requires--websocket-secure-key-path
to test client connections.Expected behavior
The flag should not be required.
Additional context
Why
The text was updated successfully, but these errors were encountered: