Re: SSL cleanups/hostname verification

Поиск
Список
Период
Сортировка
От Magnus Hagander
Тема Re: SSL cleanups/hostname verification
Дата
Msg-id 952E99E9-2585-4A99-ABEE-6F85D3A69597@hagander.net
обсуждение исходный текст
Ответ на Re: SSL cleanups/hostname verification  (Peter Eisentraut <peter_e@gmx.net>)
Список pgsql-hackers



On 21 okt 2008, at 13.41, Peter Eisentraut <peter_e@gmx.net> wrote:

> Martijn van Oosterhout wrote:
>> SSH is a good example, it only works with self-signed certificates,  
>> and
>> relies on the client to check it. Libpq provides a mechanism for the
>> client to verify the server's certificate, and that is safe even if  
>> it
>> is self-signed.
>> If the client knows the certificate the server is supposed to  
>> present,
>> then you can't have a man-in-the-middle attack, right? Whether it's
>> self-signed or not is irrelevent.
>
> That appears to be correct, but that was not the original issue  
> under discussion.
>
> Both a web browser and an SSH client will, when faced with an  
> untrusted certificate, pop a question to the user.  The user then  
> verifies the certificate some other way (in theory), answers/clicks  
> yes, and then web browser and SSH client store the certificate  
> locally marked as trusted, so this question goes away




>
>> Preventing casual snooping without preventing MitM is a rational  
>> choice
>> for system administrators.
>
> I am not an expert in these things, but it seems to me that someone  
> who can casually snoop can also casually insert DHCP or DNS packages  
> and redirect traffic.  There is probably a small niche where just  
> encryption without server authentication prevents information leaks,  
> but it is not clear to me where this niche is or how it can be  
> defined, and I personally wouldn't encourage this sort of setup.


В списке pgsql-hackers по дате отправления:

Предыдущее
От: Tom Lane
Дата:
Сообщение: Re: automatic parser generation for ecpg
Следующее
От: Magnus Hagander
Дата:
Сообщение: Re: SSL cleanups/hostname verification