mirror of
https://github.com/evilsocket/opensnitch.git
synced 2025-03-04 08:34:40 +01:00
![]() Allow to cypher channel communications with certificates. There are 3 authentication types: simple, tls-simple and tls-mutual. - 'simple' wont't cypher communications. - 'tls-simple' uses a server key and certificate for the server, and a common CA certificate or the server certificate to authenticate all nodes. - 'tls-mutual' uses a server key and certificate for the server, and a client key and certificate per node. There are 2 options to verify how gRPC validates credentials: - SkipVerify: https://pkg.go.dev/crypto/tls#Config - ClientAuthType: https://pkg.go.dev/crypto/tls#ClientAuthType Example configuration: "Server": { "Address": "127.0.0.1:12345", "Authentication": { "Type": "tls-simple", "TLSOptions": { "CACert": "/etc/opensnitchd/auth/ca-cert.pem", "ServerCert": "/etc/opensnitchd/auth/server-cert.pem", "ClientCert": "/etc/opensnitchd/auth/client-cert.pem", "ClientKey": "/etc/opensnitchd/auth/client-key.pem", "SkipVerify": false, "ClientAuthType": "req-and-verify-cert" } } } More info: https://github.com/evilsocket/opensnitch/wiki/Nodes |
||
---|---|---|
.. | ||
conman | ||
core | ||
dns | ||
firewall | ||
log | ||
netfilter | ||
netlink | ||
netstat | ||
procmon | ||
rule | ||
statistics | ||
ui | ||
.gitignore | ||
default-config.json | ||
go.mod | ||
Gopkg.toml | ||
main.go | ||
Makefile | ||
opensnitchd-dinit | ||
opensnitchd-openrc | ||
opensnitchd.service | ||
system-fw.json |