From: | "scott(dot)marlowe" <scott(dot)marlowe(at)ihs(dot)com> |
---|---|
To: | Bruce Momjian <pgman(at)candle(dot)pha(dot)pa(dot)us> |
Cc: | "Marc G(dot) Fournier" <scrappy(at)hub(dot)org>, Nathan Mueller <nmueller(at)cs(dot)wisc(dot)edu>, PostgreSQL-development <pgsql-hackers(at)postgresql(dot)org> |
Subject: | Re: 7.3.1 stamped |
Date: | 2002-12-18 20:46:14 |
Message-ID: | Pine.LNX.4.33.0212181324020.3853-100000@css120.ihs.com |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-hackers |
On Wed, 18 Dec 2002, Bruce Momjian wrote:
> Marc G. Fournier wrote:
> > > My question is whether it is safe to be making this change in a minor
> > > release? Does it work with 7.3 to 7.3.1 combinations? My other
> > > question is, if SSLv2 isn't secure, couldn't a client say they only
> > > support SSLv2, and hence break into the server? That was my original
> > > hesitancy, that and the fact Bear the SSL guy didn't want it.
> >
> > Wow, which part of "A TLS/SSL connection established with these methods
> > will understand the SSLv2, SSLv3, and TLSv1 protocol" are you finiding
> > particularly confusing? As nate explained to you, and the man page
> > section I commited states, TLSv1_method *only* supports TLS connections
> > ... SSLv23_method supports SSLv2, v3 and TLSv1 ...
> >
> > As for 'break into the server" ... ummm ... isn't that what pg_hba.conf is
> > for? I don't know about servers you run, but I don't let just anyone
> > connect to my server, and, in fact, close down the databases themsleves to
> > specific users ... if you don't trust the client, why are you giving him
> > accss to your data, regardless of the protocol being used to encrypt the
> > sessino??
>
> I wasn't sure how insecure SSL2 was, and whether it allowed you to
> authenticate without a password or something.
SSL2 seems to get a lot of votes for being broken in ways that cannot be
fixed because they aren't simple buffer overflows. see:
http://www.lne.com/ericm/papers/ssl_servers.html#1.2
My suggestion would be to eventually phase out ssl2 in favor of ssl3 or
tls. And, as we are phasing it out, make it an opt-in thing, where the
dba has to turn on ssl2 KNOWING he is turning on a flawed protocol.
From | Date | Subject | |
---|---|---|---|
Next Message | Oleg Bartunov | 2002-12-18 20:55:54 | Re: v7.3.1 tar ready ... please check it ... |
Previous Message | Bruce Momjian | 2002-12-18 20:30:36 | Re: 7.3.1 stamped |