-
Notifications
You must be signed in to change notification settings - Fork 722
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support custom certificate verification #326
Comments
Can you please provide more details of what is needed? Can't promise it will be implemented, but knowing what's needed would help. |
libp2p needs complete control of the certificate verification process. Certificates used in libp2p have a bespoke critical extension, which contains both the peer’s identity key and the a signature (of the certificate’s key) by the corresponding secret key. The data in the extension must be made available to the application. All libp2p certificates are self-signed. Ideally, the only checks that quiche would make are that the certificate is syntactically valid, that its self-signature is valid (if needed for security), and that its public key matches the signature made during the handshake. libp2p will handle verifying that the certificate is correct for the peer. |
@demimarie-parity I made #332 to let applications see the peer's leaf certificate (as a DER blob). You can then disable certificate verification using How does that sound? |
@demimarie-parity ping? |
@ghedo That works, thanks! |
This is needed for libp2p, among other uses.
The text was updated successfully, but these errors were encountered: