From: | Frank Büttner <frank(dot)buettner(at)mdc-berlin(dot)de> |
---|---|
To: | PostgreSQL WWW <pgsql-www(at)lists(dot)postgresql(dot)org> |
Subject: | Re: [ext] Re: Misconfiguration on SSL for download.postgresql.org ? |
Date: | 2023-11-28 07:06:33 |
Message-ID: | d95ac833-752a-42c9-bc5a-e03dd7a9f5bc@mdc-berlin.de |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-bugs pgsql-www |
Hi Stefan,
now the download of the updates will works again.
The exact date is unclear when the problems started.
The only think that was done on our site war an update for the RHEL9
servers to 9.3 an for the RHEL8 one to 8.9
Thanks
Frank
Am 23.11.23 um 21:04 schrieb Stefan Kaltenbrunner:
> On 11/23/23 09:21, Frank Büttner wrote:
>> Hi at all,
>
> Hi Frank!
>
>> since some day's all our servers can't download updates for the RPM
>> packages of PostgreSQL.
>
> the current TLS configuration has been in place for a long time now - so
> I suspect the issue started when you constrained your local TLS client
> in terms of elliptic curves...
>
>>
>> Error:
>> Errors during downloading metadata for repository 'pgdg-common':
>> - Curl error (35): SSL connect error for
>> https://download.postgresql.org/pub/repos/yum/common/redhat/rhel-9-x86_64/repodata/repomd.xml [error:0A000410:SSL routines::sslv3 alert handshake failure]
>> Fehler: Failed to download metadata for repo 'pgdg-common': Cannot
>> download repomd.xml: Cannot download repodata/repomd.xml: All mirrors
>> were tried
>>
>> After checking the site via nmap:
>> nmap -p 443 download.postgresql.org --script ssl-enum-ciphers
>> | TLSv1.3:
>> | ciphers:
>> | TLS_AKE_WITH_AES_256_GCM_SHA384 (secp384r1) - A
>> | TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
>> | TLS_AKE_WITH_AES_128_GCM_SHA256 (secp384r1) - A
>>
>>
>> I found the problem, the "x25519" ciphers are missing.
>> | TLSv1.3:
>> | ciphers:
>> | TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
>> | TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
>>
>>
>> Which are need on systems where the NIST curves are blocked for
>> security reasons.
>>
>>
>> So please re enable the x25519 curve.
>
> I would kinda argue that your current configuration is in direct
> violation of RFC8446(TLS 1.3) as well as 7748(elliptic curves for
> security) which explicitly state that x25519 only a SHOULD while
> supporting secp256r1 is declared a MUST and a mandatory supported key
> exchange so it seems a bit of a stretch to consider us not supporting it
> a "misconfiguration".
>
> However we have now modified our TLS configuration to fall back to the
> embedded curves list within openssl (which among other things) enables
> x25519.
>
>
>
> Stefan
--
*Frank Büttner*
IT
MDC Berlin-Buch
Max-Delbrück-Centrum für Molekulare Medizin in der Helmholtz-Gemeinschaft
Robert-Rössle-Straße 10
13125 Berlin
☎ +49 30 9406 2038
℻ +49 30 9406 2599
✉ frank(dot)buettner(at)mdc-berlin(dot)de
From | Date | Subject | |
---|---|---|---|
Next Message | PG Bug reporting form | 2023-11-28 07:15:41 | BUG #18216: Unaccent function is unable to remove accents (diacritic signs) from Japanese character 'ド' |
Previous Message | Richard Guo | 2023-11-28 07:03:49 | Re: BUG #18187: Unexpected error: "variable not found in subplan target lists" triggered by JOIN |
From | Date | Subject | |
---|---|---|---|
Next Message | Eirik Bakke | 2023-11-30 19:49:46 | Request to be included in the "PostgreSQL GUI Tools" list |
Previous Message | Cédric Villemain | 2023-11-24 08:02:38 | Re: Improve our wiki |