You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
As a complement to issue #389 it is necessary to investigate the use of CA certificates in macOS and if necessary, adapt the code so that the validation of server certificates is performed through the API provided by the OS.
Certificate validation in macOS should follow the same logic as in #389:
full (default):
Validates that the server certificate is signed by a trusted CA.
Ensures the server hostname matches the certificate's SAN or CN.
certificate:
Validates that the server certificate is signed by a trusted CA.
Does not validate the server hostname.
none:
Disables all certificate validation.
No checks are performed on the certificate's CA signature or the server hostname. Note: This mode disables critical SSL/TLS security features and is not recommended for production environments.
The text was updated successfully, but these errors were encountered:
Description
As a complement to issue #389 it is necessary to investigate the use of CA certificates in macOS and if necessary, adapt the code so that the validation of server certificates is performed through the API provided by the OS.
Certificate validation in macOS should follow the same logic as in #389:
full
(default):certificate
:none
:Note: This mode disables critical SSL/TLS security features and is not recommended for production environments.
The text was updated successfully, but these errors were encountered: