-
Notifications
You must be signed in to change notification settings - Fork 99
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow TLS verification to be skipped #181
Comments
Are you signing the certs using a internal CA for test purpose? This is quite easy and then you just tell it the path to the CA? |
No, I didn't want to go through the hassle of setting up a CA. |
It's the right thing to do though and its really easy. That said, server does support disabling verify so seems reasonable CLI should too, its a easy PR if you want to else it might take some time. |
Bumping on a slightly different request - would it be possible to report that the server's certificate is not trusted? Currently the NATS CLI just fails with an "i/o timeout" -- but it would be great to report that the x509 certificate was signed by an unknown authority - or whatever the trust issue is. |
This is already happening |
If I don't supply a |
Struggling to reproduce that, not giving a CA is same as using system CA - but its possible I fixed this in main already so I am not seeing it. Can you do a build of |
Hello,
In production we're using valid TLS certificates only for securing the connection, not validating the client. However in test I'm using self-signed certificates for this. There doesn't appear to be a way to disable the NATS client from attempting to verify the TLS certificate of the server. It would be nice to have this option.
Thanks
The text was updated successfully, but these errors were encountered: