-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
NewServerTLS vs NewClientTLS in example #1
Comments
After further testing, it seems Go gRPC implementation magically uses the server public key to encrypt messages on the client (still trying to find out where exactly), so you wouldn't need to grab it from the handshake. The following creates a connection where the RPC's are encrypted, not sure exactly how yet. config := &tls.Config{
InsecureSkipVerify: true,
}
opts = append(opts, grpc.WithTransportCredentials(credentials.NewTLS(config)))
conn, err := grpc.DialContext(ctx, host, opts...) |
Hey nleiva, I’m currently on vacation, but I’ll have a deeper look when I return about your first comment. However on the second comment, by doing skipverify, you are telling grpc not to verify the public cert. You will get transport encryption, but you might be doing it to a man in the middle. The server in this case can also only provide its public cert and not the cert chain that validates the cert. Finally, because you didn’t get the cert in the handshake, you cannot validate the cert is signed by a trusted root CA you expect. So in essence, no one can listen to the conversation, but you don’t know who you are talking to. |
No worries, take your time and enjoy your time off. I actually created a few test cases here to probe this. You don't need to access the Server certificate yourself in order to validate it, it will be done for you. If you clone the repo, do If you don't provide the CA cert, the connection is not established (if |
Thanks for your blog post, very inspiring. One thing I noticed while trying to implement this on a gRPC client is your example calls
NewServerTLSFromCert
instead ofNewClientTLSFromCert
. I personally use client configs for Dial options (I might be off here).So, in my case I had to create a
certPool
with thePeerCertificates
that I can pass toNewClientTLSFromCert(cp *x509.CertPool, serverNameOverride string)
.The good news is that it works!, I could connect to the devices (server) without manually providing the
.pem
certificate file. On the other hand, I'm still wrapping my head around this asNewClientTLSFromCert
pass this cert asRootCAs
.The text was updated successfully, but these errors were encountered: