Re: sslmode=require fallback

Поиск
Список
Период
Сортировка
От Robert Haas
Тема Re: sslmode=require fallback
Дата
Msg-id CA+TgmoavMSfRz4jrxWq=yF5TJ6ijQknPLB=suWjAnEmdD1XYGA@mail.gmail.com
обсуждение исходный текст
Ответ на Re: sslmode=require fallback  (Magnus Hagander <magnus@hagander.net>)
Список pgsql-hackers
On Fri, Jul 15, 2016 at 4:14 AM, Magnus Hagander <magnus@hagander.net> wrote:
>> The original complaint was not actually that "prefer" is a bad default,
>> but that in the presence of a root certificate on the client, a
>> certificate validation failure falls back to plain text.  That seems
>> like a design flaw of the "prefer" mode, no matter whether it is the
>> default or not.
>
> The entire "prefer" mode is a design flaw, that we unfortunately picked as
> default mode.

Well, you keep saying that, but what I'm saying is you should stop
complaining about and start figuring out how to fix it. :-)

> If it fails *for any reason*, it falls back to plaintext. Thus, you have to
> assume it will make a plaintext connection. Thus, it gives you zero
> guarantees, so it serves no actual purpose from a security perspective.
>
> it will equally fall back on incompatible SSL configs. Or on a network
> hiccup. The presence of the certificate is just one of many different
> scenarios where it will fall back.
>
> If you care about encryption, you should pick something else
> (require/verify). If you don't care about encryption, you should pick
> something else (allow, probably) so as not to pay unnecessary overhead.

If we think trying to push everyone on to SSL isn't a good plan, then
how about changing the default to allow?

-- 
Robert Haas
EnterpriseDB: http://www.enterprisedb.com
The Enterprise PostgreSQL Company



В списке pgsql-hackers по дате отправления:

Предыдущее
От: "Armor"
Дата:
Сообщение: One question about transformation ANY Sublinks into joins
Следующее
От: Robert Haas
Дата:
Сообщение: Re: Improving executor performance - tidbitmap