Re: TLS certificate alternate trust paths issue in libpq - certificate chain validation failing

From: Jacob Champion <jacob(dot)champion(at)enterprisedb(dot)com>
To: Thomas Spear <speeddymon(at)gmail(dot)com>
Cc: pgsql-hackers(at)lists(dot)postgresql(dot)org
Subject: Re: TLS certificate alternate trust paths issue in libpq - certificate chain validation failing
Date: 2024-04-30 22:19:37
Message-ID: CAOYmi+mXOv1XwAhwf_WCd+_4F8q_F_0dN=_CBfT6zi6QhTigtg@mail.gmail.com
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-hackers

On Tue, Apr 30, 2024 at 2:41 PM Thomas Spear <speeddymon(at)gmail(dot)com> wrote:
> The full details can be found at github.com/pgjdbc/pgjdbc/discussions/3236 - in summary, both jdbc-postgres and the psql cli seem to be affected by an issue validating the certificate chain up to a publicly trusted root certificate that has cross-signed an intermediate certificate coming from a Postgres server in Azure, when using sslmode=verify-full and trying to rely on the default path for sslrootcert.

Hopefully someone more familiar with the Azure cross-signing setup
sees something obvious and chimes in, but in the meantime there are a
couple things I can think to ask:

1. Are you sure that the server is actually putting the cross-signed
intermediate in the chain it's serving to the client?

2. What version of OpenSSL? There used to be validation bugs with
alternate trust paths; hopefully you're not using any of those (I
think they're old as dirt), but it doesn't hurt to know.

3. Can you provide a sample public certificate chain that should
validate and doesn't?

Thanks,
--Jacob

In response to

Responses

Browse pgsql-hackers by date

  From Date Subject
Next Message Nathan Bossart 2024-05-01 00:57:30 pg_sequence_last_value() for unlogged sequences on standbys
Previous Message Thomas Spear 2024-04-30 21:40:50 TLS certificate alternate trust paths issue in libpq - certificate chain validation failing