Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Improve crt validation with ssl_c_verify #743

Merged
merged 1 commit into from
Feb 27, 2021
Merged

Conversation

jcmoraisjr
Copy link
Owner

HAProxy Ingress validates client certificates using ACL in order to give a http response. The samples used were ssl_c_ca_err that returns >0 if there is a problem in the ca bundle (depth>0), and ssl_c_err that returns >0 if there is a problem in the certificate itself. However, there were observed outdated client certificates that doesn't trigger a failure in ssl_c_err but it does in ssl_c_verify which also check against the CA bundle and motivated this update.

HAProxy Ingress validates client certificates using ACL in order to
give a http response. The samples used were `ssl_c_ca_err` that returns
>0 if there is a problem in the ca bundle (depth>0), and `ssl_c_err`
that returns >0 if there is a problem in the certificate itself.
However, there were observed outdated client certificates that doesn't
trigger a failure in `ssl_c_err` but it does in `ssl_c_verify` which
also check against the CA bundle and motivated this update.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant