-
-
Notifications
You must be signed in to change notification settings - Fork 303
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
task sync relies on embedded/integrated certificate store and does not obey system store #3625
Comments
Would you be able to test a patch? |
i should be able to- might take me a day or two to get a build environment set up
|
Check out the diff in #3626? |
@snicker were you able to test that patch? |
unfortunately no, the next day an exception was added that made it impossible to test as the certificate was no longer intercepted |
OK, that's fine. I filed GothenburgBitFactory/taskchampion#460 to track this in TC, and once that's done I think we could add a build flag for Taskwarrior. That should probably default to using the built-in certs, as that's the safer option. |
OK, this can be added once the next release of TaskChampion is merged. |
TaskChampion is updated, so now it's time to make this feature accessible in TW. |
Recently corporate IT implemented TLS inspection using ZScaler and suddently my ability to synchronize tasks with my taskwarrior sync server is failing with an "unknown issuer" error, using Taskwarrior 3.1.0 and the
task sync
command:output from openssl, showing that the system level certs handle intercepting and modifying trust chain (though this is not something I am really fond of)
compared to how this cert chain ought to look:
the change seems to be necessary to make in taskwarrior/taskchampion to use system level certs? but I am not a TLS expert.
similar issue is described here:
volta-cli/volta#1427
and the fix:
volta-cli/volta#1375
I can't seem to find any workaround to support this.
The text was updated successfully, but these errors were encountered: