Removing --no-cert-check

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, 2016-09-07 at 21:27 +0200, Dennis Knorr wrote:
> You're right for production. But for Testing and Development, i would?
> rather prefer that you keep it :) Perhaps just remove it from?
> documentation *cough*

I can't think of a really valid use case. Here's what happens when I
connect to a test server with an invalid cert:

$ ./openconnect [::1]:443
POST https://[::1]/
Connected to [::1]:443
SSL negotiation with [::1]
Server certificate verify failed: unable to get local issuer certificate

Certificate from VPN server "[::1]" failed verification.
Reason: unable to get local issuer certificate
To trust this server in future, perhaps add this to your command line:
????--servercert sha1:a82547f68f44d6351bef6cacd1d7b96e84f9dfa3
Enter 'yes' to accept, 'no' to abort; anything else to view:?

It *tells* me how to shut it up...

$ ./openconnect [::1]:443 --servercert sha1:a82547f68f44d6351bef6cacd1d7b96e84f9dfa3
POST https://[::1]/
Connected to [::1]:443
SSL negotiation with [::1]
Server certificate verify failed: unable to get local issuer certificate
Connected to HTTPS on [::1]
XML POST enabled
Please enter your username.
Username:

And the NetworkManager?GUI will basically do that automatically for you
when you accept the invalid cert for the first time.

-- 
dwmw2


-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/x-pkcs7-signature
Size: 5760 bytes
Desc: not available
URL: <http://lists.infradead.org/pipermail/openconnect-devel/attachments/20160907/f825d737/attachment.bin>


[Index of Archives]     [Linux Samsung SoC]     [Linux Rockchip SoC]     [Linux Actions SoC]     [Linux for Synopsys ARC Processors]     [Linux NFS]     [Linux NILFS]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]


  Powered by Linux