Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

validate SSL by default #481

Open
wants to merge 2 commits into
base: master
Choose a base branch
from
Open

Conversation

flokli
Copy link

@flokli flokli commented Jan 24, 2018

It should be good practice in 2018 to validate SSL certificates by default, and require the user to disable this explicitly if a validation should NOT be performed.

It should be good practice in 2018 to validate SSL certificates by default, and require the user to disable this explicitly if a validation should NOT be performed.

Signed-off-by: Florian Klink <[email protected]>
@cannatag
Copy link
Owner

Hi, sorry for answering late. I'm not sure if this is a feasible approach. LDAP very often is used in internal network where certificates are self signed. To check for ssl validation would cause troubles to a lot of people. Perhaps is better to include a clear statement of this in the docs.

@flokli
Copy link
Author

flokli commented Feb 13, 2018 via email

@cannatag
Copy link
Owner

I prefer not to change this default because it breaks compatibility with previous v2.x version because I'm following semantic versioning rules. I can change in version 3.x.

@cannatag cannatag closed this Feb 26, 2018
@flokli
Copy link
Author

flokli commented Feb 26, 2018

@cannatag understood. Can we still add an issue to a 3.x milestone, so this won't get lost?

@cannatag
Copy link
Owner

cannatag commented Feb 26, 2018 via email

@cannatag cannatag added this to the v3 milestone Feb 26, 2018
@cannatag cannatag reopened this Feb 26, 2018
@Augustin-FL
Copy link
Contributor

Augustin-FL commented Dec 30, 2020

I'm sorry to insist but I definitely agree with this PR : would it be possible to enforce certificate checking by default?

If users are using this lib on an internal network, then it's the job of these users to set up an internal PKI and to trust it (in the Windows Certificate Trust Store, or in the Linux folders /etc/ssl/certs and /etc/pki/ca-trust/ )

@cannatag
Copy link
Owner

cannatag commented Dec 30, 2020 via email

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants