Searched hist:a0cd6d29 (Results 1 – 2 of 2) sorted by relevance
/openbmc/qemu/block/ |
H A D | nbd.c | a0cd6d29 Fri Mar 04 13:36:01 CST 2022 Daniel P. Berrangé <berrange@redhat.com> block/nbd: support override of hostname for TLS certificate validation
When connecting to an NBD server with TLS and x509 credentials, the client must validate the hostname it uses for the connection, against that published in the server's certificate. If the client is tunnelling its connection over some other channel, however, the hostname it uses may not match the info reported in the server's certificate. In such a case, the user needs to explicitly set an override for the hostname to use for certificate validation.
This is achieved by adding a 'tls-hostname' property to the NBD block driver.
Reviewed-by: Eric Blake <eblake@redhat.com> Signed-off-by: Daniel P. Berrangé <berrange@redhat.com> Message-Id: <20220304193610.3293146-4-berrange@redhat.com> Signed-off-by: Eric Blake <eblake@redhat.com>
|
/openbmc/qemu/qapi/ |
H A D | block-core.json | a0cd6d29 Fri Mar 04 13:36:01 CST 2022 Daniel P. Berrangé <berrange@redhat.com> block/nbd: support override of hostname for TLS certificate validation
When connecting to an NBD server with TLS and x509 credentials, the client must validate the hostname it uses for the connection, against that published in the server's certificate. If the client is tunnelling its connection over some other channel, however, the hostname it uses may not match the info reported in the server's certificate. In such a case, the user needs to explicitly set an override for the hostname to use for certificate validation.
This is achieved by adding a 'tls-hostname' property to the NBD block driver.
Reviewed-by: Eric Blake <eblake@redhat.com> Signed-off-by: Daniel P. Berrangé <berrange@redhat.com> Message-Id: <20220304193610.3293146-4-berrange@redhat.com> Signed-off-by: Eric Blake <eblake@redhat.com>
|