Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Using public certificate for intercepting proxy #1425

sshantha22 started this conversation in General
Discussion options

Hi,
I am currently running the proxy with the following command:
python3 -m proxy --port 8888 --plugins custom.MyPlugin --ca-cert-file intermediate.cert.pem --ca-key-file intermediate.key.nopass.pem --ca-signing-key ca.key.nopass.pem

and it works great. However, I am using a private CA here and this would require that client applications to update their certificate chain for validation. I am looking to simplify the adoption process here.

So my questions is: Is there support built in already to use a public certificate (not a CA certificate) with *.domain so that the same certificate can be used for all connections and not issue a custom certificate for each url? If yes, is there an example that I can use as reference?

You must be logged in to vote

Replies: 1 comment

Comment options

The idea here is that if the original endpoint is example.com and if the proxy endpoint is xyz.com, then client will use endpoint example.xyz.com and the proxy will use *.xyz.com as the certificate and will forward requests to example.com after removing xyz from the url. this way, clients are not required to update their certificate chain or open up firewall for other ports.

You must be logged in to vote
0 replies
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
1 participant

AltStyle によって変換されたページ (->オリジナル) /