From: | Jacob Champion <jacob(dot)champion(at)enterprisedb(dot)com> |
---|---|
To: | Andres Freund <andres(at)anarazel(dot)de> |
Cc: | Daniel Gustafsson <daniel(at)yesql(dot)se>, PostgreSQL Hackers <pgsql-hackers(at)postgresql(dot)org>, Marko Kreen <markokr(at)gmail(dot)com>, Adrian Klaver <adrian(dot)klaver(at)gmail(dot)com>, Peter Eisentraut <peter_e(at)gmx(dot)net>, Heikki Linnakangas <hlinnaka(at)iki(dot)fi> |
Subject: | Re: ecdh support causes unnecessary roundtrips |
Date: | 2024-06-17 17:19:23 |
Message-ID: | CAOYmi+mkPAw-PG78whPa0PzTdwZ8PXAK8f-Eg7FrW=50U+hW2Q@mail.gmail.com |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-hackers |
On Mon, Jun 17, 2024 at 10:01 AM Andres Freund <andres(at)anarazel(dot)de> wrote:
> On 2024-06-17 12:00:30 +0200, Daniel Gustafsson wrote:
> > To set the specified curve in ssl_ecdh_curve we have to don't we?
>
> Sure, but it's not obvious to me why we actually want to override openssl's
> defaults here. There's not even a parameter to opt out of forcing a specific
> choice on the server side.
I had exactly the same question in the context of the other thread, and found
https://www.openssl.org/blog/blog/2022/10/21/tls-groups-configuration/index.html
My initial takeaway was that our default is more restrictive than it
should be, but the OpenSSL default is more permissive than what they
recommend in practice, due to denial of service concerns:
> A general recommendation is to limit the groups to those that meet the
> required security level and that all the potential TLS clients support.
--Jacob
From | Date | Subject | |
---|---|---|---|
Next Message | Daniel Gustafsson | 2024-06-17 17:29:47 | Re: ecdh support causes unnecessary roundtrips |
Previous Message | Andres Freund | 2024-06-17 17:01:33 | Re: ecdh support causes unnecessary roundtrips |