-
Notifications
You must be signed in to change notification settings - Fork 74
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Accessing underlying TLS information #397
Comments
As this is a blocking issue for our project, I'm working on a temporary fix. We need to know the public key with which a client connected. Definitely not a permanent solution, but hopefully enough to get us unblocked. The idea is:
This also requires a patch to I'll try to post results here of how this idea goes. Still curious whether there is a more official way of doing this already or in the planning. |
I should advise you to use module R = (val (Mimic.repr ssl_protocol))
let connect ~ctx =
Mimic.resolve ctx >>= function
| R.T (ssl : Lwt_ssl.socket) -> ... A small tutorial exists about As far as I can say, we don't have for the mid-term a plan to improve significantly |
Thanks for your answer. I'll check out mimic. |
Update: the experiment worked and I am able to access connection information, but it took me a while to figure out why all the values in Please see issue #401 |
What is the proper way to access the underlying TLS information in conduit 4.0? In particular, I would like to be able to access information about the epoch / certificates from within a server connection callback.
For reference, this was also discussed here: issue 253
Also, since
tls
is an optional dependency, how does one reliably access theTls_lwt.t
structure or something similar?Thanks.
The text was updated successfully, but these errors were encountered: