Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Would like to override behavior of MyIdentityManager #32

Open
lorenh opened this issue Aug 28, 2017 · 3 comments
Open

Would like to override behavior of MyIdentityManager #32

lorenh opened this issue Aug 28, 2017 · 3 comments

Comments

@lorenh
Copy link

lorenh commented Aug 28, 2017

Currently there is an internal class inside of DtlsServer used to look up user keys called MyIdentityManager. I would like a way to override the behavior to supply a different user key storage mechanism. Currently this is not possible since it is created directly on line 24 of DtlsServer.cs in the constructor. An alternate implementation of DtlsServer is also not able to be injected since it is created directly at line 134 of DTLSSession.cs. Just wanted to mention this in case you are working on some refactoring in this area for the next version.

@jimsch
Copy link
Collaborator

jimsch commented Aug 28, 2017

That is currently no on my to do list and is unlikely to get there until after a get a basic ACL system working. The key set can be dynamically updated if that is what you are trying to do. On the other hand a pull request would be interesting as well.

@lorenh
Copy link
Author

lorenh commented Aug 28, 2017

Yes, we did figure out that the KeySet can be updated, and that will get us by for now. Thanks for letting me know you don't have it on your radar. I may do a PR when it gets to the point that we need this.

@jimsch
Copy link
Collaborator

jimsch commented Jun 3, 2018

There is now - only in the tls_certs branch in my repro - a set of events that will be triggered if an unknown PSK is found. Would also fire for certificates and unknown RPKs. Please look and see if that would solve your needs.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants