Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Implement verifyCertChain to have the firmware verify the conduit certificate #5

Open
suyashkumar opened this issue Jul 28, 2018 · 1 comment

Comments

@suyashkumar
Copy link
Owner

Instead of hardcoding the TLS fingerprint for the conduit certificate (that may change), the firmware should verify the certificate chain from a root CA certificate using verifyCertChain as discussed here and here

moved here from suyashkumar/conduit#73

@suyashkumar
Copy link
Owner Author

Implementing this requires changes in two other dependency repositories. Corresponding issues have been opened:
timum-viw/socket.io-client#30
Links2004/arduinoWebSockets#352

I will likely proceed with implementing necessary changes in those two libraries over the next couple weeks as discussed on Links2004/arduinoWebSockets#352.

suyashkumar added a commit that referenced this issue Sep 8, 2018
Update to new default SSL fingerprint for api.conduit.suyash.io (closes #6) and allows for the user of this library to specify a fingerprint of their own if they choose.

Of course, ideally no fingerprint would be needed for verification (and we could just verify by checking the certificate chain against a known root certificate). This change requires downstream changes in other libraries, however, and is being tracked by #5.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant