mirror of
https://gitlab.com/libvirt/libvirt.git
synced 2025-01-11 07:17:44 +00:00
qemu: conf: Enable 'chardev_tls_x509_verify' by default
Chardevs don't have any other form of client authentication on top of the TLS transport, so the only way to authenticate clients is to verify their certificate. Enable this option by defauilt when both 'chardev_tls_x509_verify' and 'default_tls_x509_verify' were not configured. Resolves: https://bugzilla.redhat.com/show_bug.cgi?id=1879477 Signed-off-by: Peter Krempa <pkrempa@redhat.com> Reviewed-by: Michal Privoznik <mprivozn@redhat.com>
This commit is contained in:
parent
940ef34443
commit
019f962c86
@ -258,7 +258,8 @@
|
||||
# CA in the chardev_tls_x509_cert_dir (or default_tls_x509_cert_dir).
|
||||
#
|
||||
# If this option is not supplied, it will be set to the value of
|
||||
# "default_tls_x509_verify".
|
||||
# "default_tls_x509_verify". If "default_tls_x509_verify" is not supplied either,
|
||||
# the default is "1".
|
||||
#
|
||||
#chardev_tls_x509_verify = 1
|
||||
|
||||
|
@ -1253,7 +1253,7 @@ virQEMUDriverConfigSetDefaults(virQEMUDriverConfigPtr cfg)
|
||||
} while (0)
|
||||
|
||||
SET_TLS_VERIFY_DEFAULT(vnc, false);
|
||||
SET_TLS_VERIFY_DEFAULT(chardev, false);
|
||||
SET_TLS_VERIFY_DEFAULT(chardev, true);
|
||||
SET_TLS_VERIFY_DEFAULT(migrate, false);
|
||||
SET_TLS_VERIFY_DEFAULT(backup, false);
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user