-
-
Notifications
You must be signed in to change notification settings - Fork 359
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Trusting self-signed certificates #181
Comments
Just to get it right - you want the connectivity to the upstream server to be encrypted in transport (HTTP over TLS) with self-signed certificate which fails because of CA verification? |
Yes, this is exactly the problem. My development resource server does not have a public domain name and therefore I cannot use a certificate signed by a CA. The only solution I have found so far is to secure Oathkeeper's incoming requests and change my upstream redirection to HTTP. |
Sorry for the late reply, sounds like a reasonable feature request. Open to accept PRs! |
This allows for appending a certificate file to the Root CA without altering the system Root CA. This is useful for allowing self-signed certificates on the upstream connections
I have created a function that should do what is required, but im having trouble figuring out how to implement the configuration part. Help would be appreciated. - At least this shows how to implement extending the Root CA for upstream connections. This is not ready to be merged. I just did not understand how pull requests work on forks. Is my first time, sorry. |
Any news about this? |
Yes i have completed the code that does the heavy lifting, hope it will be satisfactory. Update: I have added documentation and checked the code for formatting so that should be in order. I am a little in doubt about the test case. It will require mocking an upstream server which seem like a lot of work as there is no pre-existing test for upstream connectivity, i might just leave it here... |
The feature should be completed in PR 706 |
Hi team, how about authenticators:
cookie_session:
enabled: true
config:
check_session_url: https://kratos:4433/sessions/whoami
preserve_path: true
extra_from: "@this"
subject_from: "identity.id" |
Not yet, I think support for custom CAs should be something for Oathkeeper next (#441)! I think the easiest workaround for now is to register the certificate in the trust store of the OS / container? |
This allows for appending a certificate file to the Root CA without altering the system Root CA. This is useful for allowing self-signed certificates on the upstream connections
Hello contributors! I am marking this issue as stale as it has not received any engagement from the community or maintainers a year. That does not imply that the issue has no merit! If you feel strongly about this issue
Throughout its lifetime, Ory has received over 10.000 issues and PRs. To sustain that growth, we need to prioritize and focus on issues that are important to the community. A good indication of importance, and thus priority, is activity on a topic. Unfortunately, burnout has become a topic of concern amongst open-source projects. It can lead to severe personal and health issues as well as opening catastrophic attack vectors. The motivation for this automation is to help prioritize issues in the backlog and not ignore, reject, or belittle anyone. If this issue was marked as stale erroneous you can exempt it by adding the Thank you for your understanding and to anyone who participated in the conversation! And as written above, please do participate in the conversation if this topic is important to you! Thank you 🙏✌️ |
I am trying to connect to a resource server using Oathkeeper in Docker for Windows and, since I am still in my development setup, I am using self-signed certificates. So far, I have successfully managed to hit the resource server, but Oathkeeper keeps complaining about the server certificate being signed by an unknown authority. The log message is the following:
It would be useful to support using self-signed certificates in Oathkeeper to allow testing HTTPS connections before going into production. I suggest two options:
--skip-tls-verify
in Hydra. However, this should not affect incoming TLS connections.I believe both alternatives have different use cases. The first one would allow to quickly test HTTPS communication with resource servers, whereas the second would be useful to secure last mile connections in those scenarios where you cannot or do not want to use certificates signed by a CA.
Any help would be greatly appreciated.
P.S. This an extended repost of the following forum message suggested by @arekkas.
The text was updated successfully, but these errors were encountered: