Re: Re: [COMMITTERS] pgsql: Add support for matching wildcard server certificates to the new
От | Magnus Hagander |
---|---|
Тема | Re: Re: [COMMITTERS] pgsql: Add support for matching wildcard server certificates to the new |
Дата | |
Msg-id | 4933FD4E.4040703@hagander.net обсуждение исходный текст |
Ответ на | Re: Re: [COMMITTERS] pgsql: Add support for matching wildcard server certificates to the new ("Robert Haas" <robertmhaas@gmail.com>) |
Ответы |
Re: Re: [COMMITTERS] pgsql: Add support for matching wildcard server certificates to the new
|
Список | pgsql-hackers |
Robert Haas wrote: >>> 2. I can't see any possible way that matching a single component could >>> create security holes that would be eliminated by matching multiple >>> components, but I'm more skeptical about the other direction. What >>> about the old DNS hack where you create a DNS record for >>> example.com.sample.com and hijack connections intended for example.com >>> made by people whose default DNS suffix is sample.com? There may be >>> reason to believe this isn't a problem, but matching less seems like >>> it can't possibly be a bad thing. >> Right, but that's all about being careful not to give out certs like >> "*.postgres.*". > > Errrr...no. The point is that if you've hacked sample.com's DNS > server, you might have a cert for *.sample.com, but you might NOT have > a cert for example.com. Oh, now I see. Yes, it would break on that. But I don't really see the problem: * If you have a cert for *.sample.com, you trust sample.com * All you can do is direct traffic *to* sample.com, which is trusted. But I guess it could be a potential issue with global CAs, if you just blindly add them to the trust list. //Magnus
В списке pgsql-hackers по дате отправления: