Feature #5035
openAuto accept SSL certificates
0%
Description
In a channel with numerous bots that come and go, and sometimes change IP address, the current flow where it is necessary to accept the certificate for incoming SSL DCC transfers is tedious, and requires being present when a first time transfer starts, but transfers may be queued or triggered by some outside factor, and sent from an unpredictable nickname, although perhaps with a known certificate SHA fingerprint. A couple ideas to resolve this:
1) include an option to simply accept all offered certificates
2) a list of cert fingerprints to always accept (nx=*,XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX)
3) a list of nicks (supporting wildcards) to always accept (nx="SomeBot*",*)
4) a list of nicks (supporting wildcards), each with an associated fingerprint (nx="SomeBot*",XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX)
I realize that auto accepting certs means you are not verifying the source, but in these cases the use of SSL is only intended to encrypt the traffic, the identification of the sender is not necessarily important.