From: | Alexey Klyukin <alexk(at)hintbits(dot)com> |
---|---|
To: | Heikki Linnakangas <hlinnakangas(at)vmware(dot)com> |
Cc: | PostgreSQL-development <pgsql-hackers(at)postgresql(dot)org> |
Subject: | Re: implement subject alternative names support for SSL connections |
Date: | 2014-08-24 12:11:38 |
Message-ID: | CAAS3ty+xU4rEqUFXiqfyq5wNY8k=sme28DvyfVgjOkae1LE+Ew@mail.gmail.com |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-hackers |
On Wed, Aug 20, 2014 at 11:53 AM, Heikki Linnakangas <
hlinnakangas(at)vmware(dot)com> wrote:
> On 07/25/2014 07:10 PM, Alexey Klyukin wrote:
>
>> Greetings,
>>
>> I'd like to propose a patch for checking subject alternative names entry
>> in
>> the SSL certificate for DNS names during SSL authentication.
>>
>
> Thanks! I just ran into this missing feature last week, while working on
> my SSL test suite. So +1 for having the feature.
>
> This patch needs to be rebased over current master branch, thanks to my
> refactoring that moved all OpenSSL-specific stuff to be-secure-openssl.c.
The patch is rebased against fe-secure-openssl.c (that's where
verify_peer_name_matches_certificate appeared in the master branch), I've
changed the condition in the for loop to be less confusing (thanks to
comments from Magnus and Tom), making an explicit break once a match is
detected.
Note that It generates a lot of OpenSSL related warnings on my system (66
total) with clang, complaining about
$X is deprecated: first deprecated in OS X 10.7
[-Wdeprecated-declarations], but it does so for most other SSL functions,
so I don't think it's a problem introduced by this patch.
Sincerely,
Alexey.
Attachment | Content-Type | Size |
---|---|---|
ssl_san_v2.diff | text/plain | 3.7 KB |
From | Date | Subject | |
---|---|---|---|
Next Message | Tom Lane | 2014-08-24 16:01:30 | Re: failures on barnacle (CLOBBER_CACHE_RECURSIVELY) because of memory leaks |
Previous Message | Haribabu Kommi | 2014-08-24 11:22:03 | Re: Parallel Sequence Scan doubts |