-
Notifications
You must be signed in to change notification settings - Fork 15
Description
My organization uses advanced firewalls ("NGFW") which perform real-time inline SSL/TLS decryption & re-encryption, and as a result the TLS certificate which my hosts running dra see is a custom, non-public certificate signed by a private certificate authority.
This is a common scenario in large enterprise and institutional networks.
uv (also written in Rust) solves this problem by supporting a CLI flag + Environment Variable --native-tls which uses the Host OS Trusted CA store.
I believe uv uses rustls-platform-verifier (or a derivative thereof) to do this, but I'm a rust noob so I'm not exaclty sure of the mechanism.
Can dra get a --native-tls style option, pretty please? I can't use it without host/custom root CA support.
Thanks!
The error I get when using dra:
$ dra untag devmatteini/dra
Error fetching release: io: invalid peer certificate: UnknownIssuer
github.com TLS Certificate inspection:
$ openssl s_client -connect github.com:443 </dev/null 2>/dev/null | openssl x509 -noout -subject -issuer
subject=CN=github.com
issuer=C=US, ST=CA, O=<redacted>, OU=IT, CN=decrypt.<redacted>.com