--- Begin Message --- As far as I know with the current client implementation the server certificate is always valid and I believe additional work is required to bypass validity checks and allow things like self signed certificates.

A client could check this, but it would require work to do this in ClientTLSState::setup.

After SSL_CTX_new I believe you would need to add a call SSL_CTX_set_verify with a verification callback which could be used to inspect the server certificate and bypass checks.  I'm not sure it's worth the effort.


However it might be useful to add a virtual function call after the if (fCtx == NULL) check to allow the user to make changes to the context, e.g. setting allowed TLS versions, allowed encryption methods, ciphers etc.

The same goes for ServerTLSState::setup a virtual function might be useful to allow the user to customise the context, if you do so I'd move the 3 calls between SSL_CTX_new and SSL_new in setup into that virtual function, maybe have it return a boolean value to replicate the current break statements.


On 17/06/2025 10:21, Ross Finlayson wrote:

On Jun 17, 2025, at 2:13 AM, BENMOUSSA Yahia - Contractor via live-devel 
<[email protected]> wrote:

At the client side, how we can check the validity of the server certificate ?
For ex. It is self-signed certificate or not.
As far as I know, there’s no way for the client to check this.  Once the TLS 
connection succeeds, it is assumed to be valid.


Ross Finlayson
Live Networks, Inc.
http://www.live555.com/


_______________________________________________
live-devel mailing list
[email protected]
http://lists.live555.com/mailman/listinfo/live-devel

--- End Message ---
_______________________________________________
live-devel mailing list
[email protected]
http://lists.live555.com/mailman/listinfo/live-devel

Reply via email to