From client I already have tls config which sets InsecureSkipVerify
to true. How to write server for this client which take any cert.
Can tls.config
help in server too? like setting InsecureSkipVerify
to true?
No, as @JimB told you, TLS can't work without certificates.
The reasoning is simple: TLS is all about security, and certificates are cryptographic keys which provide that security (TLS uses a so-called "asymmetric cryptography" where each party has a key pair consisting of a private and public parts; the public part is what get sent to another party when doing a TLS handshake).
But on the other hand the security TLS provides is two-fold:
Certificates are used for both aspects: the fact they contain cryptographic keys is used for (2), and the fact they have owner's identity encoded in them (and verified by whoever was issued a particular cercificate) is used for (1).
Let me not digress into discussing how (1) works in detail (though I truly urge you to read some theory on it) but (1) is what you actually want to sidestep.
The good (for you) thing is that it's cheaply doable:
The latter requires nothing but something which is able to generate
X.509 certificates; OpenSSL
is typically used for this;
just google for it.
If you're on Debian or Debian derivative (like Ubuntu, Mint etc)
consider installing the ssl-cert
package and using
the make-ssl-cert
program it provides.
¹ To be precise, they only protect the very initial phase of the exchange during which the parties generate and send to each other keys used for symmetric encryption, which are then used to encrypt the communication channel, and are regenerated (and re-exchanged) periodically. This is done because symmetric algoritms are way faster.