# HG changeset patch # User Kim Alvefur # Date 1739575141 -3600 # Node ID 99d2100d29187ea550eafa7b6a97f18d9ecb131a # Parent 1aa7efabeacb05a75f2e6466a1677972f3436c24 core.certmanager: Move LuaSec verification tweaks to mod_s2s These two settings are only really needed for XMPP server-to-server connections. diff -r 1aa7efabeacb -r 99d2100d2918 core/certmanager.lua --- a/core/certmanager.lua Sat Feb 15 10:31:37 2025 +0000 +++ b/core/certmanager.lua Sat Feb 15 00:19:01 2025 +0100 @@ -189,10 +189,6 @@ single_ecdh_use = tls.features.options.single_ecdh_use; no_renegotiation = tls.features.options.no_renegotiation; }; - verifyext = { - "lsec_continue", -- Continue past certificate verification errors - "lsec_ignore_purpose", -- Validate client certificates as if they were server certificates - }; curve = tls.features.algorithms.ec and not tls.features.capabilities.curves_list and "secp384r1"; curveslist = { "X25519", diff -r 1aa7efabeacb -r 99d2100d2918 plugins/mod_s2s.lua --- a/plugins/mod_s2s.lua Sat Feb 15 10:31:37 2025 +0000 +++ b/plugins/mod_s2s.lua Sat Feb 15 00:19:01 2025 +0100 @@ -1097,6 +1097,10 @@ -- FIXME This only applies to Direct TLS, which we don't use yet. -- This gets applied for real in mod_tls verify = { "peer", "client_once", }; + verifyext = { + "lsec_continue", -- Continue past certificate verification errors + "lsec_ignore_purpose", -- Validate client certificates as if they were server certificates + }; }; multiplex = { protocol = "xmpp-server"; @@ -1111,6 +1115,10 @@ encryption = "ssl"; ssl_config = { verify = { "peer", "client_once", }; + verifyext = { + "lsec_continue", -- Continue past certificate verification errors + "lsec_ignore_purpose", -- Validate client certificates as if they were server certificates + }; }; multiplex = { protocol = "xmpp-server";