You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We are using NSQ in production and are loving the experience.
We have implemented a custom nsqauth server and would like to encrypt the connection between nsqd and this endpoint with TLS because we don't want our authentication secrets to be sent over an unencrypted connection (potentially over an untrusted network).
Separating nsqd and the nsqauth server is common in cloud environments, where no assumptions about the network security should be made.
Passing an https:// URL to --auth-http-address works fine if the server-side certificate is trusted by the system CA pool, but self-signed certificates / custom CAs are not accepted by default, of course.
The --tls-root-ca-file is not respected for the auth HTTP request either, the *tls.Config in http.ClientTransport.TLSClientConfig is simply set to nil.
Adding a flag to support a custom CA or simply including the existing --tls-root-ca-file in the cert pool would greatly simplify encrypting the connection with a custom certificate.
The text was updated successfully, but these errors were encountered:
We are using NSQ in production and are loving the experience.
We have implemented a custom nsqauth server and would like to encrypt the connection between nsqd and this endpoint with TLS because we don't want our authentication secrets to be sent over an unencrypted connection (potentially over an untrusted network).
Separating nsqd and the nsqauth server is common in cloud environments, where no assumptions about the network security should be made.
Passing an
https://
URL to--auth-http-address
works fine if the server-side certificate is trusted by the system CA pool, but self-signed certificates / custom CAs are not accepted by default, of course.The
--tls-root-ca-file
is not respected for the auth HTTP request either, the *tls.Config inhttp.ClientTransport.TLSClientConfig
is simply set to nil.Adding a flag to support a custom CA or simply including the existing
--tls-root-ca-file
in the cert pool would greatly simplify encrypting the connection with a custom certificate.The text was updated successfully, but these errors were encountered: