Re: [PATCH v20] GSSAPI encryption support - Mailing list pgsql-hackers
From | Stephen Frost |
---|---|
Subject | Re: [PATCH v20] GSSAPI encryption support |
Date | |
Msg-id | 20190221233910.GO6197@tamriel.snowman.net Whole thread Raw |
In response to | Re: [PATCH v20] GSSAPI encryption support (Robbie Harwood <rharwood@redhat.com>) |
Responses |
Re: [PATCH v20] GSSAPI encryption support
|
List | pgsql-hackers |
Greetings, * Robbie Harwood (rharwood@redhat.com) wrote: > Stephen Frost <sfrost@snowman.net> writes: > > * Robbie Harwood (rharwood@redhat.com) wrote: > >> Sure! I'll go ahead and hack up the checks and lucid stuff and get > >> back to you. > > > > Great! I'll finish fleshing out the basics of how to have this work > > server-side and once the checks and lucid stuff are in on the psql > > side, it should be pretty straight-forward to copy that same > > information into beentry alongside the SSL info, and expose it through > > pg_stat_get_activity() into a pg_stat_gss view. > > When the mech is gss_mech_krb5 under MIT krb5: > > psql (12devel) > GSSAPI encrypted connection (krb5 using aes256-cts-hmac-sha384-192) > Type "help" for help. > > And the same under Heimdal: > > psql (12devel) > GSSAPI encrypted connection (krb5 using aes256-cts-hmac-sha1-96) > Type "help" for help > > If the mech weren't gss_krb5, or Lucid introspection failed, but we're a > SASL-aware mech (and using MIT): > > psql (12devel) > GSSAPI encrypted connection (~256 bits) > Type "help" for help. > > The third case (no lucid, no SASL SSF): > > psql (12devel) > GSSAPI encrypted connection (unknown mechanism) > Type "help" for help. > > Feel free to tweak these strings as needed. That all looks fantastic! Do you see any reason to not say: GSSAPI encrypted connection (SASL SSF: ~256 bits) instead, since that's what we are technically reporting there? > I've also adjusted the layering somewhat and moved the actual printf() > call down into fe-secure-gssapi.c I don't know whether this model makes > more sense in the long run, but for PoC code it was marginally easier to > reason about. No, I think we need to provide a way for libpq-using applications to get at that information easily.. > Another thing I've been thinking about here is whether the SASL SSF > logic is useful. It'll only get invoked when the mechanism isn't > gss_mech_krb5, and only under MIT. SPNEGO (krb5), NTLM (gss-ntlmssp), > IAKERB (krb5), and EAP (moonshot) all don't support > GSS_C_SEC_CONTEXT_SASL_SSF; I actually couldn't come up with another > mechanism that does. I defer to you on whether to remove that, though. Oh, hmm, I see. Yeah, since there's no case where that could actually end up being used today then perhaps it makes sense to remove it- it's not a terribly good interface anyway since it doesn't provide the actual encryption algorithm, I had just gone down that route because I saw how to. The lucid stuff is much better. :) > I did some testing with Heimdal since we're using some extensions here, > and found out that the current build machinery doesn't support Heimdal. Hah! > (The configure.in detection logic only seems to work for MIT and > Solaris.) However, it's possible to explicitly pass in CFLAGS/LDFLAGS > and it worked prior to my changes, so I've preserved that behavior. Alright. That seems like an independent change, if we decide to make it easier for people to build with heimdal, but there hasn't been much call for it, clearly. > Finally, as this patch touches configure.in, configure needs to be > regenerated; I'm not sure what project policy is on when that happens > (and it produces rather a lot of churn on my machine). There's some magic there due to vendor changes to autoconf, as I recall, which is likely why you're seeing a lot of churn. > Patch attached after the break; apply on top of -20. Ok. I'm pretty amazed at how little code it was to do.. Is there somewhere that these functions are publicly documented and how they can be used from a GSSAPI handle is documented? Thanks a lot for this work! Stephen
Attachment
pgsql-hackers by date: