Skip to content

transport: separate implied client certificate usage with trusted ca#11703

Closed
dennisdegreef wants to merge 1 commit intoetcd-io:masterfrom
dennisdegreef:fix_trusted_ca_without_client_certs
Closed

transport: separate implied client certificate usage with trusted ca#11703
dennisdegreef wants to merge 1 commit intoetcd-io:masterfrom
dennisdegreef:fix_trusted_ca_without_client_certs

Conversation

@dennisdegreef
Copy link

The trusted CA flag currently implies using client certificates.
However, since the CA is added to the ones we trust, we can now also use it
to validate self-signed certificates between peers for example when only
doing 'simple' TLS without client certificates.
This also makes the 'client-cert-auth' a more explicit boolean flag.

Fixes #11124

This also answers the question at the bottom of #10400

The trusted CA flag currently implies using client certificates.
However, since the CA is added to the ones we trust, we can now also use it
to validate self-signed certificates between peers for example when only
doing 'simple' TLS without client certificates.
This also makes the 'client-cert-auth' a more explicit boolean flag.

Fixes etcd-io#11124
@stale
Copy link

stale bot commented Jun 15, 2020

This issue has been automatically marked as stale because it has not had recent activity. It will be closed after 21 days if no further activity occurs. Thank you for your contributions.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Development

Successfully merging this pull request may close these issues.

etcd 3.4.0 server expects client cert when client-cert-auth = false

1 participant