mirror of
https://github.com/mmatczuk/go-http-tunnel.git
synced 2026-05-15 14:16:17 -06:00
[GH-ISSUE #105] How to prevent just anyone joining your server. #56
Labels
No labels
pull-request
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/go-http-tunnel#56
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @1ubuntuuser on GitHub (Oct 30, 2019).
Original GitHub issue: https://github.com/mmatczuk/go-http-tunnel/issues/105
Hello, I have been playing around with this and it seems to be working well and easy to set up, maybe to easy. Then it occurred to me that my server isn't only allowing "known" clients to connect, but just anybody who happens to know the server IP.
How does one restrict what clients are allowed to connect to a server?
Thanks!
@1ubuntuuser commented on GitHub (Oct 30, 2019):
Found something in the code.
rootCA := flag.String("rootCA", "", "Path to the trusted certificate chian used for client certificate authentication, if empty any client certificate is accepted")Are the server configuration options located anywhere apart from the readme?
Not sure how to generate a rootCA but I think I have a start now.
@1ubuntuuser commented on GitHub (Oct 30, 2019):
That's enough for one night I think... Didn't get it going unfortunately.
@1ubuntuuser commented on GitHub (Oct 30, 2019):
Alrighty, was able to use generate and use a ca.pem file. the server is rejecting requests from unauthenticated clients nicely. Unfortunately can't figure out the last piece of the puzzle which is how to generate client certificates using the root ca.
It sure would be nice to have someone write some instructions for newbies!
@1ubuntuuser commented on GitHub (Oct 30, 2019):
Success (finally)!
This write up shed some light on it.
https://stuff-things.net/2015/09/17/client-certificate-ca-setup-and-signing/
I also was able to study the container that is still in a PR to get an idea of how the keys are created.
Perhaps don't close this until you consider adding some instructions to the README.md?
@stobias123 commented on GitHub (Dec 20, 2019):
@danielwilson654 - this use case is documented in the docs via
-clientsflag or use ofroot_caIMO this issue should be closed.