From: | Jacob Champion <jacob(dot)champion(at)enterprisedb(dot)com> |
---|---|
To: | David Zhang <idrawone(at)gmail(dot)com> |
Cc: | Pgsql Hackers <pgsql-hackers(at)lists(dot)postgresql(dot)org>, Daniel Gustafsson <daniel(at)yesql(dot)se> |
Subject: | Re: Proposal for implementing OCSP Stapling in PostgreSQL |
Date: | 2024-07-18 17:18:20 |
Message-ID: | CAOYmi+=oK3Vmt8jNvXw4pH_QZ09pnpHQ6MjF1XOY316cro_Ceg@mail.gmail.com |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-hackers |
On Wed, Jul 17, 2024 at 3:42 PM David Zhang <idrawone(at)gmail(dot)com> wrote:
> Totally agree. Either Implementing OCSP requests over HTTP, then parsing
> the response and then saving the results to a file, or using an OpenSSL
> client with a cron job to periodically update the file should work.
> Using a cron job would likely have less impact on PostgreSQL.
Yeah, my preference would be to farm this job out to OpenSSL entirely.
Implementing OCSP-over-HTTP ourselves seems unlikely to buy us much,
for all the work it would give us.
> Totally agree, then we should limit OCSP stapling check for the
> leaf/PostgreSQL server certificate only in v1.
Sounds good. Maybe a future version can implement a check of the full
chain, but I imagine we'll have to follow someone else's lead.
> > A question from ignorance: how does the client decide that the
> > signature on the OCSP response is actually valid for the specific
> > chain in use?
>
> If I understand correctly, the certificate used by the OCSP responder to
> sign the OCSP response must be valid for the specific chain in use, or
> the admins allow to load a new chain to validate the certificate used to
> sign the OCSP response. I think it would be better to make this part to
> be more open.
Okay. That part needs more design work IMO, and solid testing.
> > If it's okay with you, I'd like to volunteer to refactor out the
> > duplicated recipes in sslfiles.mk. I have some particular ideas in
> > mind and don't want to make you play fetch-a-rock. (No pressure to use
> > what I come up with, if you don't like it.)
> That would be great, thanks a lot in advance!
No problem! I've attached two patches that can be optionally applied
on top of yours:
- 0001 simplifies the response generation into a single recipe.
- 0002 is a bigger change that uses `openssl ca` to generate index
files, as opposed to constructing them manually ourselves.
(The makefile will get even smaller without multi-stapling support,
but I didn't want to combine that with the refactor.)
For 0002, I'm wiping the new CA index for each recipe and rebuilding
it from scratch, then copying it into place (this relies on the
.NOTPARALLEL setting up top for correctness). I think there's probably
an even simpler approach, which would be to generate a single index
that can produce all of our desired responses. I can give that a try
once multi-stapling support is pulled out.
> Thanks a lot for reviewing and providing all your feedback!
You're very welcome, thanks for working on this feature!
--Jacob
Attachment | Content-Type | Size |
---|---|---|
0002-WIP-move-to-OpenSSL-constructed-index-files.patch.txt | text/plain | 8.3 KB |
0001-WIP-simplify-.res-generation.patch.txt | text/plain | 4.4 KB |
From | Date | Subject | |
---|---|---|---|
Next Message | Fujii Masao | 2024-07-18 17:47:59 | Re: make pg_ctl more friendly |
Previous Message | Jeff Davis | 2024-07-18 17:13:34 | Re: Built-in CTYPE provider |