вт, 30 апр. 2019 г. в 23:30, Marcin Romaszewicz :
>
> Now we're onto the topic of TLS chain of trust. The full answer is
> complicated.
>
> In your case, I think the answer is Yes.
>
> Say you have RootCA which signs SubCA which signs ServerCert.
>
> When your server serves on the internet, it can
Now we're onto the topic of TLS chain of trust. The full answer is
complicated.
In your case, I think the answer is Yes.
Say you have RootCA which signs SubCA which signs ServerCert.
When your server serves on the internet, it can present just ServerCert to
the clients, and if the clients know (
вт, 30 апр. 2019 г. в 23:01, Marcin Romaszewicz :
>
> Look at the ""crypto/x509" package, specifically at CertPool. You would load
> your CA public cert and intermediate cert's into a CertPool.
>
> Once you have a CertPool, you can use it in tls.Config to configure your TLS
> connections. Given a
Apologies. I'm quite new to Go and what you are seeking is probably over my
head.
On Tuesday, April 30, 2019 at 1:53:13 PM UTC-6, Vasiliy Tolstov wrote:
>
> вт, 30 апр. 2019 г. в 16:23, >:
> >
> >
> > If I'm understanding your question correctly, this Youtube video from
> the 2018 Gophercon
Look at the ""crypto/x509" package, specifically at CertPool. You would
load your CA public cert and intermediate cert's into a CertPool.
Once you have a CertPool, you can use it in tls.Config to configure your
TLS connections. Given a valid certificate chain, Go will automatically
validate server
вт, 30 апр. 2019 г. в 16:23, :
>
>
> If I'm understanding your question correctly, this Youtube video from the
> 2018 Gophercon should help: https://www.youtube.com/watch?v=kxKLYDLzuHA
>
Thanks, i'm already saw this. My question about ability to get trust
root self signed CA cert, and trust all i