From: | Jacob Champion <pchampion(at)vmware(dot)com> |
---|---|
To: | "daniel(at)yesql(dot)se" <daniel(at)yesql(dot)se> |
Cc: | "hlinnaka(at)iki(dot)fi" <hlinnaka(at)iki(dot)fi>, "pgsql-hackers(at)lists(dot)postgresql(dot)org" <pgsql-hackers(at)lists(dot)postgresql(dot)org>, "andrew(dot)dunstan(at)2ndquadrant(dot)com" <andrew(dot)dunstan(at)2ndquadrant(dot)com>, "michael(at)paquier(dot)xyz" <michael(at)paquier(dot)xyz>, "thomas(dot)munro(at)gmail(dot)com" <thomas(dot)munro(at)gmail(dot)com>, "andres(at)anarazel(dot)de" <andres(at)anarazel(dot)de>, "sfrost(at)snowman(dot)net" <sfrost(at)snowman(dot)net> |
Subject: | Re: Support for NSS as a libpq TLS backend |
Date: | 2021-02-02 20:33:35 |
Message-ID: | ca450cb8a74de3dcc753386f57a5f1d5221d6916.camel@vmware.com |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-hackers |
On Tue, 2021-02-02 at 00:55 +0000, Jacob Champion wrote:
> On Mon, 2021-02-01 at 21:49 +0100, Daniel Gustafsson wrote:
> > > Embedded NULLs are now handled in a similar manner to the OpenSSL side,
> > > though because this failure happens during the certificate
> > > authentication callback, it results in a TLS alert rather than simply
> > > closing the connection.
> >
> > But returning SECFailure from the cert callback force NSS to terminate the
> > connection immediately doesn't it?
>
> IIRC NSS will send the alert first, whereas our OpenSSL implementation
> will complete the handshake and then drop the connection. I'll rebuild
> with the latest and confirm.
I wasn't able to reproduce the behavior I thought I saw before. In any
case I think the current NSS implementation for embedded NULLs will
work correctly.
> > Attached is a v24 which is
> > rebased on top of todays --with-ssl commit, and now includes your changes.
I have a v25 attached which fixes and re-enables the skipped/todo'd
client certificate and SCRAM tests. (Changes between v24 and v25 are in
since-v24.diff.) The server-cn-only database didn't have the root CA
installed to be able to verify client certificates, so I've added it.
Note that this changes the error message printed during the invalid-
root tests, because NSS is now sending the root of the chain. So the
server's issuer is considered untrusted rather than unrecognized.
--Jacob
Attachment | Content-Type | Size |
---|---|---|
since-v24.diff | text/x-patch | 6.2 KB |
v25-0001-NSS-Frontend-Backend-and-build-infrastructure.patch | text/x-patch | 108.7 KB |
v25-0002-NSS-Testharness-updates.patch | text/x-patch | 52.8 KB |
v25-0003-NSS-pg_strong_random-support.patch | text/x-patch | 3.1 KB |
v25-0004-NSS-Documentation.patch | text/x-patch | 19.8 KB |
v25-0005-NSS-contrib-modules.patch | text/x-patch | 29.6 KB |
v25-0006-NSS-cryptohash-support.patch | text/x-patch | 6.6 KB |
From | Date | Subject | |
---|---|---|---|
Next Message | Robert Haas | 2021-02-02 20:37:19 | Re: [HACKERS] Custom compression methods |
Previous Message | Peter Geoghegan | 2021-02-02 20:33:14 | Re: New IndexAM API controlling index vacuum strategies |