diff --git a/main.go b/main.go index 1dd63f9..e2e0f18 100644 --- a/main.go +++ b/main.go @@ -391,7 +391,7 @@ func signCert(cCtx *cli.Context) error { } isTrusted, err := signingclient.IsDomainTrusted(conn, keyFingerprint, domainList) - fmt.Printf("is certificate trusted: %t\n", isTrusted) + fmt.Printf("Certificate trust status: %t\n", isTrusted) if !isTrusted { os.Exit(1) diff --git a/signingserver/signingserver.go b/signingserver/signingserver.go index b226537..0ff29e7 100644 --- a/signingserver/signingserver.go +++ b/signingserver/signingserver.go @@ -84,41 +84,29 @@ func (signServer *BismuthSigningServer) connHandler(conn net.Conn, metadata *ser // This is probably a bit too big, but I'd like to air on the side of caution here... keyFingerprintLength := make([]byte, 2) - fmt.Println("keyFingerLen") - if _, err := conn.Read(keyFingerprintLength); err != nil { return err } keyFingerprintBytes := make([]byte, binary.BigEndian.Uint16(keyFingerprintLength)) - fmt.Println("keyFingerBytes") - if _, err := conn.Read(keyFingerprintBytes); err != nil { return err } keyFingerprint := hex.EncodeToString(keyFingerprintBytes) - serverDomainListLength := make([]byte, 2) - fmt.Println("serverDomainListLen") - if _, err := conn.Read(serverDomainListLength); err != nil { return err } serverDomainListBytes := make([]byte, binary.BigEndian.Uint16(serverDomainListLength)) - fmt.Println("serverDomainList") - fmt.Printf("len: %d\n", binary.BigEndian.Uint16(serverDomainListLength)) - if _, err := conn.Read(serverDomainListBytes); err != nil { return err } - fmt.Println("done") - serverDomainList := strings.Split(string(serverDomainListBytes), "\n") // We can't trust anything if they aren't advertising any domains/IPs