-
Notifications
You must be signed in to change notification settings - Fork 349
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
TLS httpc error: no relevant CRLs #700
Comments
After some reading, this looks like a more general problem beyond Tesla. The CRL is downloaded & unpacked but it fails elsewhere. And I'm seeing the error pop up even for well known domains (for ex Google's). I wonder if setting |
We experienced a partial service outage because of this today - our service weren't able to communicate with the outer world.
Reverting to Tesla @teamon I wonder how this issue cropped in and how are you planning to prevent this from happening in the future? |
I am deprecating the version at the moment, @lessless, I wonder, did you check the release notes under https://github.com/elixir-tesla/tesla/releases/tag/v1.12.0? |
I didn't. That's on me. But even if I checked it, it wouldn't raise any red flags for me. We already communicate with all third-party services through encrypted channels, so I don't think changing the default flag would make any difference. |
@lessless, I intend to focus on whatever caused you to miss the information; if there is anything I could do to mitigate the problem, please let me know.
That is the tricky situation with defaults generally; let me rethink the situation. Sorry for the inconvenience. I rollback the changes and released a new version; @teamon, is there any way I could tag |
Some people blame Tesla for the lack of proper security at the So what do I do? Damn, if I do, damn if I dont. Those complaining about So I am a bit frustrated, I feel this should be a @teamon I would say, document about Chasing a technically correct situation at the cost of stability isn't a good idea. |
@lessless by the way, I never used |
I hear you. I’m a bit of a security freak myself and 1.12.0 was, in my view, a bonafide effort at improving it. Tesla is an awesome project 💪 I don’t yet myself understand where the error comes from. I spent a few hours getting to know more about CRLs and how OTP deals with them. I may open an issue in its repo if I find it reasonable (i.e. when I’m sure I’m not misunderstanding how it’s supposed to work). |
@IngelaAndin if you have the time, would be thankful for your thoughts on this |
@g-andrade, if you have any recommendations, please send them over to #703 I would appreciate any support in the topic |
I commented the issue mentioned above, hope it helps. |
Hi,
Following #626 and the release of 1.12.0, I started getting the following error when talking to a particular endpoint:
It comes down to the recently enabled CRL check:
tesla/lib/tesla/adapter/httpc.ex
Lines 41 to 42 in 9ec3838
From my understanding of the docs, the local
ssl_crl_cache
cache will be empty unless I provide it with some database, which "can be set up in many different ways".If I read it right and this database is not ensured to be present, should the CRL check be enabled?
Relevant info: Elixir 1.16.0 / OTP 26.2.1 on GNU/Linux.
The text was updated successfully, but these errors were encountered: