Open tbfleming opened 1 year ago
What I'd like to use for identification is the peer's certificate.
If the cert isn't viable, would a regular key pair work?
It's possible, but needs to ensure that the verification step isn't vulnerable to MITM.
~Using ECDH to generate the deduplication key could work. It's vulnerable to KCI, but I don't know that that matters for this use.~
If the cert isn't viable, would a regular key pair work?
* Well-known nodes could use a configured key * Regular nodes could randomly generate on startup
Unless the verification step is bound to the TLS connection, it's going to vulnerable to MITM. When using a reverse proxy, it's probably easier to forward the client certificate than it would be to get a connection identifier.
Related:
// TODO: Make this a public key and validate it