tls: require trusted_ca when using verify_subject_alt_name. (#3550)
SAN-based verification without trusted CA is insecure, since provided values are easily spoofable. Becasue of how the existing verification code is structured, this was already enforced at run-time, and all certificates were rejected when trusted CA wasn't specified, but previously it wasn't obvious why. *Risk Level*: None *Testing*: bazel test //test/... *Docs Changes*: Added *Release Notes*: n/a Fixes #1268. Signed-off-by: Piotr Sikora <piotrsikora@google.com> Mirrored from https://github.com/envoyproxy/envoy @ 72db143131c1030e7c448e034a1a08980dc826f9pull/620/head
parent
b9cf0e88ed
commit
466c6ebf0e
1 changed files with 6 additions and 0 deletions
Loading…
Reference in new issue