-
Notifications
You must be signed in to change notification settings - Fork 15
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Problem in openmSupply desktop with certs #3395
Comments
I just tried it out by installing:
Could you please clarify what exactly you were doing? e.g. what do you mean by "Have the correct certs file as well" do you run omSupply as a public server with a public url? (@mark-prins is the omSupply desktop client supposed to be able to connect to such a server?) |
Looking at the error - the problem would be that the cert is for a domain name (xxx.msupply.org perhaps?) but.. if you connect using desktop and IP discovery, then it connects using the IP ( as per the error above ). It's a pretty unique scenario! I don't see clients being able to connect a desktop client to a public server in this way.
as potential SSL errors to allow through, in electron. Expand the list to include
I'm thinking that we do both. What do others think? |
I was thinking a different idea that we should do a http connection (instead of https connection) to the available connection servers since ssl connection can't be established in the same sub-net IPs for different servers anyway. So showing available IPs with https and trying to do a ssl connection wouldn't make sense IMO? Besides, having an option 2 (ability to add random server address/url) would be a good idea or we'll be needing that in the future at some point anyway I think. Specially, if the server is being hosted in the different cloud machine. |
Thanks Ravi - was hoping that someone would see this issue! the server will be running on SSL though so we cannot connect via HTTP |
We want ssl in any case, you don't know in which network open mSupply will run, e.g. if the local network is also publicly available as a wifi spot. To connect to self-signed certs we do our own certificate pinning, i.e. we assume there is no attacker while setting up the system, and that we are getting the correct pub cert from the server when connecting the very first time. We then remember this cert and fail if the cert has changed, e.g. this could be because there is an attacker... Will have a look if ERR_CERT_COMMON_NAME_INVALID opens up other things as well... As I understand there are two issues:
|
Is this actually a realistic scenario at the moment? I am a bit reluctant to accept any ERR_CERT_COMMON_NAME_INVALID, especially if we might want to support using the electron app as a web browser in the future. Then it might be useful to have this check in but think both features should be implemented at the same time to get it right... |
Yes, I'm with you @clemens-msupply. We could look at supplying the domain name in the discovery packet, though I don't think we have the domain on the server, so that would require extra config. Simplest would be to allow specifying the server to connect to, and that fits a couple of use-cases now, so I think is helpful. |
I don't think this is a pressing issue, but more of a nice to have. So I will remove it from the v2 milestone. Think this is mostly a problem for testers? @nisha-dangol does this need to be addressed soon? |
I haven't seen this original issue recently in v2.0.0-rc5, but have been seeing another issue on fresh installation of standalone mostly: Since on installation of standalone, it automatically starts the server and desktop-client (without giving me any time to change the updated certs manually), this error pops up continuosly. |
What went wrong? 😲
Problem in openmSupply desktop with certs
Expected behaviour 🤔
If you have correct certs used, you must not see such error?
PS: it works fine with browser, problem's only with oms-desktop exe
How to Reproduce 🔨
Steps to reproduce the behaviour:
It was working good for v1.6, so wonder if this is a problem with v1.7-rc3; need to investigate/check further!
Your environment 🌱
The text was updated successfully, but these errors were encountered: