Re: Heartbleed Impact

From: Albe Laurenz <laurenz(dot)albe(at)wien(dot)gv(dot)at>
To: "Dev Kumkar *EXTERN*" <devdas(dot)kumkar(at)gmail(dot)com>
Cc: "pgsql-general(at)postgresql(dot)org" <pgsql-general(at)postgresql(dot)org>
Subject: Re: Heartbleed Impact
Date: 2014-04-16 13:19:52
Message-ID: A737B7A37273E048B164557ADEF4A58B17CF1056@ntex2010i.host.magwien.gv.at
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-general

Dev Kumkar wrote:
>> Unless somebody changes the setting to ssl=on, there should be no problem.

> Thanks also please help to understand - does changing this postgresql.conf setting enough to be
> vulnerable here?

Just changing the setting will only cause your database server to error
out on restart - you also need to create certificates and put them into
the server directory.

So whoever does this change must know what they are doing (to some extent).

Once SSL has been enabled, a cunning attacker may be able to steal
the server's private key (if I understood the vulnerability correctly)
and then launch man-in-the-middle attacks, i.e. impersonate the server,
to eavesdrop on encrypted communication.

The remedy would be to create a new key pair for the server.

Yours,
Laurenz Albe

In response to

Responses

Browse pgsql-general by date

  From Date Subject
Next Message Stephen Frost 2014-04-16 13:24:14 Re: Heartbleed Impact
Previous Message Alvaro Herrera 2014-04-16 13:11:50 Re: Heartbleed Impact