I think ACME_TLS_1 is a sufficiently high-entropy string that the likelihood of 
brokenness from this approach is basically zero.

-g

> On Mar 23, 2019, at 9:20 PM, Daniel Holth <dho...@gmail.com> wrote:
> 
> All we have to do is have some kind of per connection certificate store or 
> flag. If acme is in the first packet and the special certificate exists, send 
> it. Otherwise send the normal certificate, for a very short window of 
> possible brokenness. Letsencrypt may or may not require correct alpn 
> negotiation. Should be simple. 
> 
> I'm happy running the acme client separately and listing my domain instead of 
> doing it all on demand inside twisted.
> 
> 
> On Sat, Mar 23, 2019, 23:59 Glyph <gl...@twistedmatrix.com 
> <mailto:gl...@twistedmatrix.com>> wrote:
> 
> 
> > On Mar 23, 2019, at 4:06 PM, Daniel Holth <dho...@gmail.com 
> > <mailto:dho...@gmail.com>> wrote:
> > 
> > HOLY REGEX BATMAN
> > 
> > class _ConnectionProxy(object):
> > 
> >    def bio_write(self, buf):
> >        if ACME_TLS_1 in buf:
> >            self.acme_tls_1 = True
> >        self.bio_write = self._obj.bio_write
> >        return self._obj.bio_write(buf)
> > Now we can choose the acme certificate store in the sni callback and
> > make letsencrypt happy!
> 
> 1. Gross
> 2. Hooray!
> 
> -g
> 
> _______________________________________________
> Twisted-Python mailing list
> Twisted-Python@twistedmatrix.com <mailto:Twisted-Python@twistedmatrix.com>
> https://twistedmatrix.com/cgi-bin/mailman/listinfo/twisted-python 
> <https://twistedmatrix.com/cgi-bin/mailman/listinfo/twisted-python>
> _______________________________________________
> Twisted-Python mailing list
> Twisted-Python@twistedmatrix.com
> https://twistedmatrix.com/cgi-bin/mailman/listinfo/twisted-python

_______________________________________________
Twisted-Python mailing list
Twisted-Python@twistedmatrix.com
https://twistedmatrix.com/cgi-bin/mailman/listinfo/twisted-python

Reply via email to