-
Notifications
You must be signed in to change notification settings - Fork 160
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Self Signed Certificate Keystore #60
Comments
You could provide the ability to hand-key the certificate's SHA1 fingerprint? : ) |
If you could just provide a way to disable the self-signed allowance, that'd be good. I install my own CA cert onto my devices, but realized that DSub worked without this. Allow self-signed should be a checkbox at least. |
I've been using DSub for a while with my Subsonic setup with a valid Root-CA cert. My certificate expired the other day and noticed that DSub continued to connect without any warnings or errors. I then proceeded to test to see how it handled self-signed certificates. It appears there is NO certificate checking done at all. Any server certificate is accepted by the DSub client, which means any MITM (Man-in-the-middle) TLS attack can be carried out trivially and credentials stolen. Other Subsonic clients that I tested off the Play Store seem to do this CA check properly. Please fix! I have a test installation that you can use to verify if needed. |
Hi @daneren2005 , by the way, this issue was assigned with CVE-2018-1000664 - |
Every server configuration has its own setting that enables the use of insecure connections. This is disabled by default. Only verified https connections are allowed. Error messages with a note about the setting have been added. CVE-2018-1000664 Discussed in daneren2005#60
Every server configuration has its own setting that enables the use of insecure connections. This is disabled by default. Only verified https connections are allowed. Error messages with a note about the setting have been added. CVE-2018-1000664 Discussed in daneren2005#60
Every server configuration has its own setting that enables the use of insecure connections. This is disabled by default. Only verified https connections are allowed. Error messages with a note about the setting have been added. CVE-2018-1000664 Discussed in daneren2005#60
Currently all self-signed certificates are accepted. On the first acceptance of a self-signed certificate for a given domain it needs to be saved on either the device keystore if accessible, or on a app specific one if nothing else. There also needs to be a way to clear it in case the self-signed certificate or domain changes.
The text was updated successfully, but these errors were encountered: