-
-
Notifications
You must be signed in to change notification settings - Fork 6
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
(feature) (types) Add Trusted CA #23
Comments
My updated borkfile, now checks if the CA is already trusted:
First
Second:
Making that generic could be awkward. I'm envisioning this part being a generic
So you'd first need to do some openssl tomfoolery to determine the CA's CN:
And then from there, grep the output of:
So... doable. But possibly awkward, unless there's a better way of doing this. And doesn't take into account the CA expiring, or another CA existing with the same name. My current method is good enough for me, but if other people would find a use for this, then I'll see if I can make a more foolproof method, and maybe wrap it up into a Type. |
This would be nice to have. If you get it working as a custom type (with tests!), submit a PR for potential inclusion in core. I haven't added it to the 1.0 release project board for the time being, but I've added the 1.0.x milestone for it, because I would like to have it in theory if we can — but I don't think it's a must for the first 'official' release, personally. |
My main issue I'd need to solve as part of getting a custom type working is that I would need some way of figuring out if a CA is already trusted. My previous solution:
failed the moment I wanted to add a second trusted CA for lmhd.me certs. The JFDI method:
requires me to enter my password every time I do a A workaround could be to have some directory external to the Keychain where I keep the CAs, and Bork will check in that directory to see if the CA is already trusted... but that's kinda hacky, and prone to issues. |
OK — so if you take the output of I am, however, hesitant to include anything that involves grabbing a cert from an arbitrary URL and then auto-trusting it. Personally I would prefer that to be two steps, so that you can do whatever protection against MITM attacks you deem appropriate for your environment. |
Ah! Nice :)
And yep. For sure. I want it to be a “grab CA from a file you’ve downloaded previously” instead.
|
I can do this with the following for now:
lucymhdavies/dev_utils@19ca331
but this feels like the sort of thing which would be useful to have a dedicated Type for.
(especially for things like checking if the cert already exists in the keychain)
The text was updated successfully, but these errors were encountered: