-
-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Custom TLS hostname validation? #678
Comments
It could be in scope! It'd be useful to look at other libraries (curl, golang, python-requests, etc) to see if and how they support this, as prior art. |
Also, it might be that #606 provides the "advanced escape hatch" you'd need? |
I gave it a quick look; that might be the exact thing I need! I'll play around with it and review it tomorrow or day after that at least! |
Sorry, with work stuff taken into account, it's going to take longer. By weekend! |
With v0.10.2, it's now possible to call |
Hi, I have this use case where I need to customize the TLS hostname validation. At first I tried to implement the support in NativeTLS for that, only to find out that it already supported the case I was thinking of: setting an expected CN different than the domain name: sfackler/rust-native-tls#141
An explanation copied from that PR:
However, I can't access that knob from Reqwest, because it just sets up the
hyper_tls::HttpsConnector
that just uses the domain name and gives no leeway for customization. This brings me to ask, before I send any PRs: is in the scope of this project to be customizable enough to be able to set up custom TLS hostname checking, or should I be using something else for this use case?The text was updated successfully, but these errors were encountered: