-
Notifications
You must be signed in to change notification settings - Fork 46
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Mutual authentication Implementation #820
Mutual authentication Implementation #820
Conversation
Also a few fixes on the peer verification mode of the ssl socket.
Linux test PASSed. |
Windows test FAILed. |
Linux test PASSed. |
1 similar comment
Linux test PASSed. |
Windows test FAILed. |
1 similar comment
Windows test FAILed. |
hazelcast/include/hazelcast/client/internal/socket/SocketFactory.h
Outdated
Show resolved
Hide resolved
Doesn't compile without SSL:
|
verify-windows |
Windows test FAILed. |
verify-windows |
Windows test PASSed. |
Good catch. Changed and tested it. |
- Make project compile withoput SSL. - Obeyed the user provided context for peer verification, do not override it.
Co-authored-by: yemreinci <18687880+yemreinci@users.noreply.github.com>
examples/tls/BasicTLSClient.cpp
Outdated
boost::asio::ssl::context ctx(boost::asio::ssl::context::method::tlsv12_client); | ||
ctx.set_default_verify_paths(); | ||
ctx.load_verify_file("/path/to/my/server/public/certificate"); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Should we also do ctx.set_verify_mode(ssl::verify_peer)
to make sure the certificate is actually verified? What is the default behavior if you don't set the verify mode?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Added.
Test failure fix.
Linux test PASSed. |
Windows test PASSed. |
…il_if_no_peer_cert` mode option since it is ignored for client side.
Linux test PASSed. |
Windows test PASSed. |
Co-authored-by: yemreinci <18687880+yemreinci@users.noreply.github.com>
Linux test PASSed. |
Linux test PASSed. |
Windows test PASSed. |
1 similar comment
Windows test PASSed. |
Linux test PASSed. |
Windows test PASSed. |
Added mutual authentication capability to the C++ client.
Also a few fixes on the peer verification mode of the ssl socket.
For windows, we had to define an environment variable
SSL_CERT_FILE=C:\cacert.pem
and downloaded the file from https://curl.se/docs/caextract.html which is Mozilla CA store. This way OpenSSL library can find the intermediate CA authorities correctly and the testssl_enabled_trust_default_certificates
works as expected.