From: | Peter Eisentraut <peter(dot)eisentraut(at)2ndquadrant(dot)com> |
---|---|
To: | Michael Paquier <michael(at)paquier(dot)xyz> |
Cc: | Postgres hackers <pgsql-hackers(at)postgresql(dot)org> |
Subject: | Re: pgsql: Update ssl test certificates and keys |
Date: | 2019-01-03 14:36:36 |
Message-ID: | 45b4249d-c1a8-18fe-e4b5-8c08aca9bd86@2ndquadrant.com |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-committers pgsql-hackers |
On 23/12/2018 09:04, Michael Paquier wrote:
> On Tue, Nov 27, 2018 at 02:21:39PM +0000, Peter Eisentraut wrote:
>> Update ssl test certificates and keys
>>
>> Debian testing and newer now require that RSA and DHE keys are at
>> least 2048 bit long and no longer allow SHA-1 for signatures in
>> certificates. This is currently causing the ssl tests to fail there
>> because the test certificates and keys have been created in violation
>> of those conditions.
>>
>> Update the parameters to create the test files and create a new set of
>> test files.
>
> Peter, would it make sense to back-patch this commit down to where the
> SSL tests have been introduced? If /etc/ssl/ is not correctly
> configured, this results in failures across branches on Debian if the
> default is used.
done
--
Peter Eisentraut http://www.2ndQuadrant.com/
PostgreSQL Development, 24x7 Support, Remote DBA, Training & Services
From | Date | Subject | |
---|---|---|---|
Next Message | Tom Lane | 2019-01-03 18:40:42 | Re: pgsql: Remove WITH OIDS support, change oid catalog column visibility. |
Previous Message | Peter Eisentraut | 2019-01-03 14:35:14 | pgsql: Update ssl test certificates and keys |
From | Date | Subject | |
---|---|---|---|
Next Message | Justin Pryzby | 2019-01-03 15:39:00 | Re: speeding up planning with partitions |
Previous Message | Stephen Frost | 2019-01-03 14:14:46 | Re: Is MinMaxExpr really leakproof? |