> using a self-signed certificate

> without the browser complaining that the certificate is invalid

By default, browsers trust certificates signed by Certificate Authorities
(CA) in the system cert store. CAs can get added if they pass certain
requirements. Typically they will only sign certificates after you've
demonstrated control over a domain name, either with a public HTTP or TLS
server or with DNS records. Running in a private network, you could use the
DNS option, but all certs issued this way will be logged publicly via
Certificate Transparency.

If you have some control over the end (clients) systems, you could instead
add your own CAs to the system cert store. This will allow you to sign
certificates for any address (domain or IP), at the cost of needing to
distribute the CA certificates to all your systems.

ACME is the standard protocol to automate signing certificates by
demonstrating control, if you run your own compatible CA in within your
private network, you can do this without leaking information to the public.

Unless you wish to distribute each self signed certificate to every client,
by definition they cannot be trusted by default.


- sean

-- 
You received this message because you are subscribed to the Google Groups 
"golang-nuts" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to golang-nuts+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/golang-nuts/CAGabyPq3y5VTKx7dg8sUd-wEJpVTi7HZHyJ0ofG3X1JEGLWWVQ%40mail.gmail.com.

Reply via email to