From: | Stefan Kaltenbrunner <stefan(at)kaltenbrunner(dot)cc> |
---|---|
To: | Frank Büttner <frank(dot)buettner(at)mdc-berlin(dot)de> |
Cc: | pgsql-bugs(at)lists(dot)postgresql(dot)org, PostgreSQL WWW <pgsql-www(at)lists(dot)postgresql(dot)org> |
Subject: | Re: Misconfiguration on SSL for download.postgresql.org ? |
Date: | 2023-11-23 20:04:01 |
Message-ID: | 580fc76b-21ae-4ecc-a255-84eef8379161@kaltenbrunner.cc |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-bugs pgsql-www |
On 11/23/23 09:21, Frank Büttner wrote:
> Hi at all,
Hi Frank!
> since some day's all our servers can't download updates for the RPM
> packages of PostgreSQL.
the current TLS configuration has been in place for a long time now - so
I suspect the issue started when you constrained your local TLS client
in terms of elliptic curves...
>
> Error:
> Errors during downloading metadata for repository 'pgdg-common':
> - Curl error (35): SSL connect error for
> https://download.postgresql.org/pub/repos/yum/common/redhat/rhel-9-x86_64/repodata/repomd.xml [error:0A000410:SSL routines::sslv3 alert handshake failure]
> Fehler: Failed to download metadata for repo 'pgdg-common': Cannot
> download repomd.xml: Cannot download repodata/repomd.xml: All mirrors
> were tried
>
> After checking the site via nmap:
> nmap -p 443 download.postgresql.org --script ssl-enum-ciphers
> | TLSv1.3:
> | ciphers:
> | TLS_AKE_WITH_AES_256_GCM_SHA384 (secp384r1) - A
> | TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
> | TLS_AKE_WITH_AES_128_GCM_SHA256 (secp384r1) - A
>
>
> I found the problem, the "x25519" ciphers are missing.
> | TLSv1.3:
> | ciphers:
> | TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
> | TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
>
>
> Which are need on systems where the NIST curves are blocked for security
> reasons.
>
>
> So please re enable the x25519 curve.
I would kinda argue that your current configuration is in direct
violation of RFC8446(TLS 1.3) as well as 7748(elliptic curves for
security) which explicitly state that x25519 only a SHOULD while
supporting secp256r1 is declared a MUST and a mandatory supported key
exchange so it seems a bit of a stretch to consider us not supporting it
a "misconfiguration".
However we have now modified our TLS configuration to fall back to the
embedded curves list within openssl (which among other things) enables
x25519.
Stefan
From | Date | Subject | |
---|---|---|---|
Next Message | Michael Paquier | 2023-11-24 02:49:21 | Re: libpq: pipeline mode might desynchronize client and server |
Previous Message | PG Bug reporting form | 2023-11-23 09:19:49 | BUG #18211: pg_catcheck_16 RPM package mssing für RHEL8 and RHEL9 repo |
From | Date | Subject | |
---|---|---|---|
Next Message | Stefan Kaltenbrunner | 2023-11-23 20:40:47 | Re: Improve our wiki |
Previous Message | Magnus Hagander | 2023-11-23 14:40:21 | Re: New blog - who dis? |