summaryrefslogtreecommitdiff
path: root/doc
diff options
context:
space:
mode:
authorghaiklor <ghaiklor@gmail.com>2016-03-27 16:09:08 +0300
committerSam Roberts <vieuxtech@gmail.com>2017-03-23 13:27:56 -0700
commit348cc80a3cbf0f4271ed30418c6ed661bdeede7b (patch)
treebea162fc8348e8812d9fec540c3f9bea8013c5ee /doc
parentee19e2923acc806fc37cabceb03460fb88c95def (diff)
downloadandroid-node-v8-348cc80a3cbf0f4271ed30418c6ed661bdeede7b.tar.gz
android-node-v8-348cc80a3cbf0f4271ed30418c6ed661bdeede7b.tar.bz2
android-node-v8-348cc80a3cbf0f4271ed30418c6ed661bdeede7b.zip
tls: make rejectUnauthorized default to true
rejectUnauthorized used to be false when the property was undefined or null, quietly allowing client connections for which certificates have been requested (requestCert is true) even when the client certificate was not authorized (signed by a trusted CA). Change this so rejectUnauthorized is always true unless it is explicitly set to false. PR-URL: https://github.com/nodejs/node/pull/5923 Reviewed-By: Sam Roberts <vieuxtech@gmail.com> Reviewed-By: James M Snell <jasnell@gmail.com> Reviewed-By: Ben Noordhuis <info@bnoordhuis.nl> Reviewed-By: Colin Ihrig <cjihrig@gmail.com>
Diffstat (limited to 'doc')
-rw-r--r--doc/api/tls.md16
1 files changed, 9 insertions, 7 deletions
diff --git a/doc/api/tls.md b/doc/api/tls.md
index 94281dd3f0..468a1b4eb8 100644
--- a/doc/api/tls.md
+++ b/doc/api/tls.md
@@ -712,7 +712,10 @@ added: v0.11.8
-->
* `options` {Object}
- * `rejectUnauthorized` {boolean}
+ * `rejectUnauthorized` {boolean} If not `false`, the server certificate is verified
+ against the list of supplied CAs. An `'error'` event is emitted if
+ verification fails; `err.code` contains the OpenSSL error code. Defaults to
+ `true`.
* `requestCert`
* `callback` {Function} A function that will be called when the renegotiation
request has been completed.
@@ -769,7 +772,7 @@ changes:
connection/disconnection/destruction of `socket` is the user's
responsibility, calling `tls.connect()` will not cause `net.connect()` to be
called.
- * `rejectUnauthorized` {boolean} If `true`, the server certificate is verified
+ * `rejectUnauthorized` {boolean} If not `false`, the server certificate is verified
against the list of supplied CAs. An `'error'` event is emitted if
verification fails; `err.code` contains the OpenSSL error code. Defaults to
`true`.
@@ -1012,9 +1015,9 @@ changes:
* `requestCert` {boolean} If `true` the server will request a certificate from
clients that connect and attempt to verify that certificate. Defaults to
`false`.
- * `rejectUnauthorized` {boolean} If `true` the server will reject any
+ * `rejectUnauthorized` {boolean} If not `false` the server will reject any
connection which is not authorized with the list of supplied CAs. This
- option only has an effect if `requestCert` is `true`. Defaults to `false`.
+ option only has an effect if `requestCert` is `true`. Defaults to `true`.
* `NPNProtocols` {string[]|Buffer} An array of strings or a `Buffer` naming
possible NPN protocols. (Protocols should be ordered by their priority.)
* `ALPNProtocols` {string[]|Buffer} An array of strings or a `Buffer` naming
@@ -1190,9 +1193,8 @@ changes:
opened as a server.
* `requestCert` {boolean} `true` to specify whether a server should request a
certificate from a connecting client. Only applies when `isServer` is `true`.
-* `rejectUnauthorized` {boolean} `true` to specify whether a server should
- automatically reject clients with invalid certificates. Only applies when
- `isServer` is `true`.
+* `rejectUnauthorized` {boolean} If not `false` a server automatically reject clients
+ with invalid certificates. Only applies when `isServer` is `true`.
* `options`
* `secureContext`: An optional TLS context object from
[`tls.createSecureContext()`][]