Conversation
|
Thanks for the PR. Happy to support mTLS, but I don't want to add another library for that. I highly doubt that the stdlib is not supporting sha256+512 and such. |
|
Seems like they stopped developing the main lib almost a decade ago. Grok confirms: https://grok.com/share/bGVnYWN5LWNvcHk_08dce699-f933-483f-83f3-2d2f230d7408 |
|
From the lib I used:
|
|
Don't believe Grok ;-) Friends don't let friends use Grok. Here's a version from ChatGPT using the stdlib, prompted on my phone: I have personally used mTLS in Go using just the stdlib. SHA-256 + SHA-512 are standards. Of course Go supports that. |
|
Isn't that a bit of a downgrade? p12 is the standard for mTLS because it encapsulates everything in one file and can be password protected. That's 3 flags/config lines and no password protection possible (PEM is plaintext). Ask gpt what the standard way to import a p12 is in Go. I quit using it due to the Dept of War deal. |
I use mTLS for my self hosted server. Would appreciate if you would include support in mainline. Let me know if you see any changes you'd like. Included changes:
--certflagNTFY_CERTcert-fileandcert-passwordI went with
software.sslmate.com/src/go-pkcs12for pkcs12/cert parsing because the std lib doesn't support sha2, which is standard now.Thanks for your work on this. Very neat project!
Full disclosure, I used Claude for this. I'm a dev myself, but little experience in Go. I mostly work in Python and Rust. But I reviewed the changes and they do seem sensible to me.