Re: libpq compression - Mailing list pgsql-hackers

From Tom Lane
Subject Re: libpq compression
Date
Msg-id 19804.1339859730@sss.pgh.pa.us
Whole thread Raw
In response to Re: libpq compression  (Magnus Hagander <magnus@hagander.net>)
Responses Re: libpq compression  ("ktm@rice.edu" <ktm@rice.edu>)
Re: libpq compression  (Magnus Hagander <magnus@hagander.net>)
Re: libpq compression  (Florian Pflug <fgp@phlo.org>)
List pgsql-hackers
Magnus Hagander <magnus@hagander.net> writes:
> On Sat, Jun 16, 2012 at 12:55 PM, Tom Lane <tgl@sss.pgh.pa.us> wrote:
>> It's not obvious to me that we actually *need* anything except the
>> ability to recognize that a null-encrypted SSL connection probably
>> shouldn't be treated as matching a hostssl line; which is not something
>> that requires any fundamental rearrangements, since it only requires an
>> after-the-fact check of what was selected.

> Maybe I spelled it out wrong. It does require it insofar that if we
> want to use this for compression, we must *always* enable openssl on
> the connection. So the "with these encryption method" boils down to
> "NULL encryption only" or "whatever other standards I have for
> encryption". We don't need the ability to change the "whatever other
> standards" per subnet, but we need to control the
> accept-NULL-encryption on a per subnet basis.

After sleeping on it, I wonder if we couldn't redefine the existing
"list of acceptable ciphers" option as the "list of ciphers that are
considered to provide encrypted transport".  So you'd be allowed to
connect with SSL using any unapproved cipher (including NULL), the
backend just considers it as equivalent to a non-SSL connection for
pg_hba purposes.  Then no change is needed in any configuration stuff.
        regards, tom lane


pgsql-hackers by date:

Previous
From: Tom Lane
Date:
Subject: Re: [patch] libpq one-row-at-a-time API
Next
From: Tom Lane
Date:
Subject: Re: Pg default's verbosity?