Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

TlsAlpnChallengeResponder disabled/enbabled option #98

Closed
Crypth opened this issue May 25, 2020 · 2 comments
Closed

TlsAlpnChallengeResponder disabled/enbabled option #98

Crypth opened this issue May 25, 2020 · 2 comments
Labels
enhancement New feature or request

Comments

@Crypth
Copy link
Contributor

Crypth commented May 25, 2020

In some conditions, cluster environments for instance, exchanging the self signed certificate is a lot more complicated than exchanging a token&response, perhaps this could be an optional way to verify the DNS name, even when running .NET Core 3+?

@Crypth Crypth added the enhancement New feature or request label May 25, 2020
@Crypth Crypth changed the title TlsAlpnChallengeResponder disableed/enbabled option TlsAlpnChallengeResponder disabled/enbabled option May 25, 2020
@natemcmaster
Copy link
Owner

If clustered environments is the main concern, could this be generalized with #79 ? I don't think it would be any more challenging to exchange the TLS-ALPN-01 response data among nodes in a clustered environment than it would be to exchange HTTP-01 data.

Aside from clustered environments, is there any other reason to the TLS-ALPN-01 challenge should be disabled?

@Crypth
Copy link
Contributor Author

Crypth commented May 26, 2020

Sure it could be joined with #79 .. the main difference is the ease which you can load the tokens on the fly, while the cert needs to be preloaded. Not sure if there are other reasons people would like to use the HTTP-01 instead, unless anyone comes up with a reason, I'll close it and reopen it if it comes up.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

2 participants