Opened 7 years ago

Closed 7 years ago

#1386 closed enhancement (wontfix)

allow_all parameter for ssl_verify_client

Reported by: anton.sergeev77@… Owned by:
Priority: minor Milestone:
Component: other Version: 1.12.x
Keywords: ssl_verify_client Cc:
uname -a:
nginx -V: nginx version: nginx/1.12.1
built by gcc 5.4.0 20160609 (Ubuntu 5.4.0-6ubuntu1~16.04.4)
built with OpenSSL 1.0.2g 1 Mar 2016
TLS SNI support enabled
configure arguments: --prefix=/etc/nginx --sbin-path=/usr/sbin/nginx --modules-path=/usr/lib/nginx/modules --conf-path=/etc/nginx/nginx.conf --error-log-path=/var/log/nginx/error.log --http-log-path=/var/log/nginx/access.log --pid-path=/var/run/nginx.pid --lock-path=/var/run/nginx.lock --http-client-body-temp-path=/var/cache/nginx/client_temp --http-proxy-temp-path=/var/cache/nginx/proxy_temp --http-fastcgi-temp-path=/var/cache/nginx/fastcgi_temp --http-uwsgi-temp-path=/var/cache/nginx/uwsgi_temp --http-scgi-temp-path=/var/cache/nginx/scgi_temp --user=nginx --group=nginx --with-compat --with-file-aio --with-threads --with-http_addition_module --with-http_auth_request_module --with-http_dav_module --with-http_flv_module --with-http_gunzip_module --with-http_gzip_static_module --with-http_mp4_module --with-http_random_index_module --with-http_realip_module --with-http_secure_link_module --with-http_slice_module --with-http_ssl_module --with-http_stub_status_module --with-http_sub_module --with-http_v2_module --with-mail --with-mail_ssl_module --with-stream --with-stream_realip_module --with-stream_ssl_module --with-stream_ssl_preread_module --with-cc-opt='-g -O2 -fstack-protector-strong -Wformat -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fPIC' --with-ld-opt='-Wl,-Bsymbolic-functions -Wl,-z,relro -Wl,-z,now -Wl,--as-needed -pie'

Description

Hello,
I need nginx to verify client and allow every verification result. Not just several allowed errors for optional_no_ca parameter.
This is useful when application want handle all unverified clients.

Is there a chance that such feature will be added?

Change History (1)

comment:1 by Maxim Dounin, 7 years ago

Resolution: wontfix
Status: newclosed

There are no plans to add such a feature to avoid encouraging people to write insecure configurations.

If you really want to allow requests with invalid certificates, consider using the error_page directive to overwrite processing of certificate verification errors. Something like this should work:

server {
    listen 443 ssl;

    ssl_certificate     server.crt;
    ssl_certificate_key server.key;

    ssl_verify_client optional;
    ssl_client_certificate client.crt;

    error_page 495 = @fallback;

    location / {
        proxy_pass http://127.0.0.1:8080;
        proxy_set_header X-Client-Verify $ssl_client_verify;
    }

    location @fallback {
        proxy_pass http://127.0.0.1:8080;
        proxy_set_header X-Client-Verify $ssl_client_verify;
    }
}
Note: See TracTickets for help on using tickets.