-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Asking for suggestions for my use cases #69
Comments
Hey @fredmaggiowski, thanks for coming along at KCD UK, and for trying out Paranoia. It's a hard problem to be sure. For me I'd look at alternatives first.
If either of thsoe are true, you could omit the certs alltogether. Failing that, if you know you only need access to some sites, like specific APIs, then you could bundle just those certs (there's a risk if the developer of those sites changes their CA though — such as moving to Cloudflare). If you do need generic certs, you're realisticly not going to be able to audit all 100+ certs in the normal bundle by yourself. Honestly the built-in OS bundles are not bad — it's just that they get outdated quickly. As for what Paranoia can do, there's already a |
Hi @JamesLaverack sorry for my late reply, thank you for this thorough answer! Yes the service needs network access but I guess we could look into trust-manager, when running in k8s it may be a viable alternative (even though the service may also run outside k8s therefore someone would have to ship the necessary CA some other way, which may still be acceptable imho). I've tried using inspect output
I'm thinking about removing these certificate and put them in the rejection list in my On a side note It would be nice to have fingerprints in both What do you think? |
Hi there, I was at KCD UK when I found out about this project; I immediately found it interesting and wanted to experiment a little bit with it.
Now I've tried adding the paranoia action in a project I'm maintaining where unfortunately I was already adding lots of cerfiicates so I now find myself with having three options:
paranoia.yml
file anytime a new certificate is issued.I believe that I should stick with option 1, however if that's not feasible what do you think would be the best option in your experience?
Also, assuming that option 1 is not feasible and that auditing +100certificate will be a pain, do you think option 3 can still be useful? I believe it can if paranoia fails the check for some unexpected issues (such as expired certificates, etc) do you see that coming? or have any plan for some interesting features that may be letting me adopt the tool even with such options at hand?
Thanks in advance!
Cheers!
The text was updated successfully, but these errors were encountered: