Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

SSL_CVERIFY_REQUIRED to follow API docs #796

Closed
wants to merge 1 commit into from

Conversation

Scottmitch
Copy link
Member

Motivation:
The OpenSSL docs specify that the SSL_VERIFY_FAIL_IF_NO_PEER_CERT flag must be masked with SSL_VERIFY_PEER. Currently netty hard codes a value of 2 for required which is just the value of SSL_VERIFY_FAIL_IF_NO_PEER_CERT.

[1] https://www.openssl.org/docs/man1.0.2/man3/SSL_CTX_set_verify.html

Server mode: if the client did not return a certificate, the TLS/SSL
handshake is immediately terminated with a "handshake failure" alert. This flag must be used together with SSL_VERIFY_PEER.

Motivation:
The OpenSSL docs specify that the `SSL_VERIFY_FAIL_IF_NO_PEER_CERT`
flag must be masked with `SSL_VERIFY_PEER`. Currently netty hard codes
a value of `2` for required which is just the value of
`SSL_VERIFY_FAIL_IF_NO_PEER_CERT`.

[1] https://www.openssl.org/docs/man1.0.2/man3/SSL_CTX_set_verify.html
> Server mode: if the client did not return a certificate, the TLS/SSL
handshake is immediately terminated with a "handshake failure" alert.
This flag must be used together with SSL_VERIFY_PEER.
@Scottmitch
Copy link
Member Author

nvm we are translating the values correctly under the covers: https://github.com/netty/netty-tcnative/blob/main/openssl-dynamic/src/main/c/sslutils.c#L642-L666

@Scottmitch Scottmitch closed this Jun 29, 2023
@Scottmitch Scottmitch deleted the ssl_verify_required branch June 29, 2023 18:08
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant