SSL over Unix-domain sockets - Mailing list pgsql-hackers

From Peter Eisentraut
Subject SSL over Unix-domain sockets
Date
Msg-id 49CA2524.5010809@gmx.net
Whole thread Raw
Responses Re: SSL over Unix-domain sockets  (Magnus Hagander <magnus@hagander.net>)
Re: SSL over Unix-domain sockets  (Bruce Momjian <bruce@momjian.us>)
List pgsql-hackers
I found an old patch on my disk to enable SSL over Unix-domain sockets.

Remember, about a year ago it was discussed that there might also be 
man-in-the-middle or fake-server attacks using Unix-domain sockets, 
because usually anyone can start a server in /tmp.  After an extensive 
discussion (mainly about moving the socket out of /tmp by default; 
please don't start that again), it was determined that using SSL server 
verification would be the proper solution and it fact works without 
problems.  Except that the start-up overhead was increased significantly 
(because of the initial key exchange and session key setup etc.).

Back then we didn't really have a good solution, but I figured since 8.4 
rearranges the SSL connection parameters anyway, we could stick that in 
there.

I imagine for example, we could invent an additional sslmode of the sort 
prefer-but-not-if-local-socket, which could be the default.

The other question is whether sslverify=cn makes sense, but that may be 
up to the user to find out.

Comments?


pgsql-hackers by date:

Previous
From: Sam Mason
Date:
Subject: Re: improving concurrent transactin commit rate
Next
From: Sam Mason
Date:
Subject: Re: Matching dimensions in arrays