Re: [PATCH] add ssl_protocols configuration option

Поиск
Список
Период
Сортировка
От Martijn van Oosterhout
Тема Re: [PATCH] add ssl_protocols configuration option
Дата
Msg-id 20141022185444.GA9295@svana.org
обсуждение исходный текст
Ответ на Re: [PATCH] add ssl_protocols configuration option  (Dag-Erling Smørgrav <des@des.no>)
Ответы Re: [PATCH] add ssl_protocols configuration option
Список pgsql-hackers
On Wed, Oct 22, 2014 at 03:14:26PM +0200, Dag-Erling Smørgrav wrote:
> > In a case like POODLE we probably wouldn't have done it anyway, as it
> > doesn't affect our connections (we're not http)
>
> If I understand correctly, imaps has been shown to be vulnerable as
> well, so I wouldn't be so sure.

Reference? It's an SSL3 specific attack, so most servers are not
vulnerable because TLS will negotiate to the highest supported
protocol.  So unless one of the client/server doesn't support TLS1.0
there's no issue.  The only reason http is vulnerable is because
browsers do protocol downgrading, something strictly forbidden by the
spec.

Additionally, the man-in-the-middle must be able to control the padding
in the startup packet, which just isn't possible (no scripting language
in the client).

Since you can already specify the cipher list, couldn't you just add
-SSLv3 to the cipher list and be done?

Have a nice day,
--
Martijn van Oosterhout   <kleptog@svana.org>   http://svana.org/kleptog/
> He who writes carelessly confesses thereby at the very outset that he does
> not attach much importance to his own thoughts.  -- Arthur Schopenhauer

В списке pgsql-hackers по дате отправления:

Предыдущее
От: Pavel Stehule
Дата:
Сообщение: Re: idea: allow AS label inside ROW constructor
Следующее
От: Heikki Linnakangas
Дата:
Сообщение: Re: BUG: *FF WALs under 9.2 (WAS: .ready files appearing on slaves)