From: | Bear Giles <bgiles(at)coyotesong(dot)com> |
---|---|
To: | pgsql-hackers(at)postgresql(dot)org |
Subject: | revised SSL patches submitted |
Date: | 2002-05-20 06:48:48 |
Message-ID: | 200205200648.AAA11250@eris.coyotesong.com |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-hackers |
Another set of SSL patches have been sent to the patches list.
(No idea when they'll get through the system.) This is a new
baseline set of patches that fix many of the problems identified
earlier and also add a number of security patches.
N.B., some of these changes are visible to the user, but are
common practice for SSL code. The most notable is a minimal
certificate validation that requires that certs be current
(no more expired certs) and that the cert's common name match
the hostname used with contacting the backend.
This means that a cert containing a common name such as
'eris.example.com' *must* be accessed via
psql -h eris.example.com ...
not
psql -h eris ...
A future patch can relax this so that the common name can
resolve to the address returned by getpeername(2).
Client certs are optional, but if they exist they are expected
in the user's home directory, under the .postgresql directory.
Encrypted private keys are not yet supported.
Bear
From | Date | Subject | |
---|---|---|---|
Next Message | Bear Giles | 2002-05-20 07:11:06 | Re: SASL, compression? |
Previous Message | Lincoln Yeoh | 2002-05-20 06:35:09 | Re: SASL, compression? |