Re: SSL cleanups/hostname verification
От | Martijn van Oosterhout |
---|---|
Тема | Re: SSL cleanups/hostname verification |
Дата | |
Msg-id | 20081021111222.GB5062@svana.org обсуждение исходный текст |
Ответ на | Re: SSL cleanups/hostname verification (Gregory Stark <stark@enterprisedb.com>) |
Ответы |
Re: SSL cleanups/hostname verification
Re: SSL cleanups/hostname verification Re: SSL cleanups/hostname verification |
Список | pgsql-hackers |
On Tue, Oct 21, 2008 at 11:55:32AM +0100, Gregory Stark wrote: > Martijn van Oosterhout <kleptog@svana.org> writes: > > > You seem to be making the assertion that making an encrypted connection > > to an untrusted server is worse than making a plaintext connection to > > an untrusted server, which seems bogus to me. > > Hm, is it? If you use good old traditional telnet you know you're typing on an > insecure connection. If you use ssh you expect it to be secure and indeed ssh > throws up big errors if it fails to get a secure connection -- it doesn't > silently fall back to an insecure connection. SSH is a good example, it only works with self-signed certificates, and relies on the client to check it. Libpq provides a mechanism for the client to verify the server's certificate, and that is safe even if it is self-signed. If the client knows the certificate the server is supposed to present, then you can't have a man-in-the-middle attack, right? Whether it's self-signed or not is irrelevent. Preventing casual snooping without preventing MitM is a rational choice for system administrators. Have a nice day, -- Martijn van Oosterhout <kleptog@svana.org> http://svana.org/kleptog/ > Please line up in a tree and maintain the heap invariant while > boarding. Thank you for flying nlogn airlines.
В списке pgsql-hackers по дате отправления: