aboutsummaryrefslogtreecommitdiff
path: root/plugin/tls/README.md
diff options
context:
space:
mode:
authorGravatar JINMEI Tatuya <jtatuya@infoblox.com> 2019-05-31 09:30:15 -0700
committerGravatar John Belamaric <jbelamaric@google.com> 2019-05-31 09:30:15 -0700
commita6d9adbf4a72b20097c9c67e438675f7af76618b (patch)
tree944d205756a7f22497c273fe79315331c478f858 /plugin/tls/README.md
parent5565ca1c0342b71fbd708aea6085b7472020db97 (diff)
downloadcoredns-a6d9adbf4a72b20097c9c67e438675f7af76618b.tar.gz
coredns-a6d9adbf4a72b20097c9c67e438675f7af76618b.tar.zst
coredns-a6d9adbf4a72b20097c9c67e438675f7af76618b.zip
make sure client CA and auth type are set if CA is explicitly specified. (#2825)
* make sure client CA and auth type are set if CA is explicitly specified. added some simple tests to confirm the effect. * test certificates (forgot to add them in the previous commit) * made client auth policy configurable with new client_auth option. README has been updated accordingly. * fix editorial in README
Diffstat (limited to 'plugin/tls/README.md')
-rw-r--r--plugin/tls/README.md10
1 files changed, 10 insertions, 0 deletions
diff --git a/plugin/tls/README.md b/plugin/tls/README.md
index 244984750..82d059ade 100644
--- a/plugin/tls/README.md
+++ b/plugin/tls/README.md
@@ -24,6 +24,16 @@ tls CERT KEY [CA]
Parameter CA is optional. If not set, system CAs can be used to verify the client certificate
+~~~ txt
+tls CERT KEY [CA] {
+ client_auth nocert|request|require|verify_if_given|require_and_verify
+}
+~~~
+
+If client_auth option is specified, it controls the client authentication policy.
+The option value corresponds to the [ClientAuthType values of the Go tls package](https://golang.org/pkg/crypto/tls/#ClientAuthType): NoClientCert, RequestClientCert, RequireAnyClientCert, VerifyClientCertIfGiven, and RequireAndVerifyClientCert, respectively.
+The default is "nocert". Note that it makes no sense to specify parameter CA unless this option is set to verify_if_given or require_and_verify.
+
## Examples
Start a DNS-over-TLS server that picks up incoming DNS-over-TLS queries on port 5553 and uses the