-
Notifications
You must be signed in to change notification settings - Fork 647
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Exposing peer client certificate within server calls (ie, as a context or metadata) #2730
Comments
gRFC L35 proposes an API to expose this information to the application. PR #508 would have implemented it in the old Node gRPC library, but clearly it was never resolved. The implementation work for grpc-js just never happened. That gRFC has a relatively restricted API because of constraints that no longer apply, namely needing to handle the intersection of the two libraries. At this point, that proposal could probably be modified to be more expressive in grpc-js in ways that are incompatible with the old library. |
Thanks for the note. Seems like there is agreement that something should exist. :) At the risk of sidetracking, but since it wasn't implemented yet: I'd ask whether we there's openness also to reconsider the implementation regarding passing raw cert buffers around. My thought is that for a server under load it wouldn't be ideal to decode the same cert multiple times per call or risk double copies of Buffers if that were to end up happening. Exposing the Http2Session or it's WDYT? |
That's why I meant by modifying the proposal to make the API more expressive. For example, it could contain the full output of |
Modern proposal for exposing client TLS cert in server-side call context. Discussion on grpc/grpc-node#2730 suggested we start here.
Hi- I put together some thoughts here: grpc/proposal#440 |
I'm curious what the current mood is towards exposing TLS peer certificate in a way that allows a gRPC server to know it's client/peer's TLS certificate. gRPC clients currently have a callback which includes the server cert thanks to #1968 so this discussion here is purely for a server to know its client's identity.
Related discussion here: grpc/grpc#7834 I think @jboeuf may have thoughts he could share. Maybe an updated 2024 version :)
Within Google, gRPC peer identities are exposed and mutual auth depends on that being possible. Externally, I haven't seen an obvious solution within grpc-js, although IIRC other gRPC language libraries might(??) expose it. I could be remembering wrong.
I believe that grpc-js ought to make granular access via peer identities a recommended approach. Google couldn't operate without it, so why wouldn't we make this available to the world, too?
FWIW: I also don't see a way to write a middleware outside of the grpc-js library that could extract and make available the TLS Certificate of a peer. I personally rely on using a modified grpc-js library which does extract and expose this information and make it available in places like a call context or metadata. But my use is thus non-standard. And I know others are interested. (ie, an unanswered post from 2020: #1258) but I'm certain I've read plenty more requests on the internet.
So, any thoughts? What's holding us back from exposing the client's TLS Cert from existing as part of a call context or injected metadata header? (obviously, security concerns should be addresses for protecting such a metadata header)
Thanks for your time and thoughts.
The text was updated successfully, but these errors were encountered: