From d9f980d090bcf1bad47e911ffe3f9253aafc2ec9 Mon Sep 17 00:00:00 2001 From: Dominik Fuhrmann <dominik.fuhrmann1@gmail.com> Date: Tue, 24 Dec 2024 13:14:15 +0100 Subject: [PATCH] removed certificate validation --- communicationScripts/client.py | 6 +----- communicationScripts/server.py | 3 --- 2 files changed, 1 insertion(+), 8 deletions(-) diff --git a/communicationScripts/client.py b/communicationScripts/client.py index 7c4a4de..abf6379 100644 --- a/communicationScripts/client.py +++ b/communicationScripts/client.py @@ -3,15 +3,11 @@ import socket import wolfssl def run_client(file_path): - # CA-Zertifikat laden - ca_cert = "../certificates/ca-cert.pem" - # Festlegen der Cipher Suite und TLS-Version cipher_suite = "TLS_AES_128_GCM_SHA256" # Sichere Cipher Suite context = wolfssl.SSLContext(wolfssl.PROTOCOL_TLSv1_3) # TLS 1.3 verwenden - context.load_verify_locations(ca_cert) context.set_ciphers(cipher_suite) - + print(f"TLS-Kontext mit Cipher Suite '{cipher_suite}' erfolgreich initialisiert.") # Sichere Verbindung mit dem Server herstellen diff --git a/communicationScripts/server.py b/communicationScripts/server.py index 7959d9b..8a0380d 100644 --- a/communicationScripts/server.py +++ b/communicationScripts/server.py @@ -1,18 +1,15 @@ import socket import wolfssl -# SERVER-SKRIPT def run_server(): # Server-Zertifikat und Schlüssel cert_file = "../certificates/server-cert.pem" key_file = "../certificates/server-key.pem" - ca_cert = "../certificates/ca-cert.pem" # CA Zertifikat, um Client zu verifizieren # Festlegen der Cipher Suite und TLS-Version cipher_suite = "TLS_AES_128_GCM_SHA256" # Sichere Cipher Suite context = wolfssl.SSLContext(wolfssl.PROTOCOL_TLSv1_3) # TLS 1.3 verwenden context.load_cert_chain(certfile=cert_file, keyfile=key_file) - context.load_verify_locations(ca_cert) # Zertifikate des CA hinzufügen context.set_ciphers(cipher_suite) # Server-Socket erstellen -- GitLab