-
Notifications
You must be signed in to change notification settings - Fork 103
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow invalid certificates #230
Comments
I don't know that I'd call self-signed certificates "invalid". I think it would be appropriate to have an option to accept any certificate with a fingerprint in a given list of fingerprints, so one would provide the fingerprint of one's self-signed certificate, just as often is done with certificate authentication to IRC services. |
I've run into this issue today as well, while trying to use https://github.com/nuxeh/url-bot-rs. Allowing self-signed certs somehow is def a good feature request. |
Duplicate of #209 |
This patch adds an option to dangerously ignore all ceritificate verifications. This option must be used with extreme caution and should only be used as a last resort. Closes aatxe#209, aatxe#230 Co-authored-by: Hyeon Kim <[email protected]>
FYI, I've made a PR for this issue: #236 |
Hey,
https://github.com/clandestinenetworks/roobot/blob/master/src/main.rs#L15 and it seems to work just fine. thanks! |
Closed by #236 it seems |
As per the title, I'd enjoy it if there were an option to allow invalid certificates when connecting over TLS, as I believe this to be an use-case for connecting to a ZNC bouncer that has its own, self-signed, certificate, created by
znc --makecert
(or something of the like, I'm not sure that that's the right flag).Currently, I get an error even if I convert the
znc.pem
into aznc.der
and pass it in in the config.The text was updated successfully, but these errors were encountered: