Re: Trust intermediate CA for client certificates - Mailing list pgsql-hackers

From Ian Pilcher
Subject Re: Trust intermediate CA for client certificates
Date
Msg-id 529CF69F.6030200@gmail.com
Whole thread Raw
In response to Re: Trust intermediate CA for client certificates  (Andrew Dunstan <andrew@dunslane.net>)
Responses Re: Trust intermediate CA for client certificates
List pgsql-hackers
On 12/02/2013 02:29 PM, Andrew Dunstan wrote:
> Wouldn't that amount to only partially trusting the root? It seems kinda
> odd. In any case, It's not something I think Postgres needs to solve.

I think that the fundamental problem is that authentication and
authorization are being conflated.  From the OpenSSL point-of-view, it
is checking that the client certificate is valid (not expired, signed by
a trusted chain of CAs, etc.); i.e. it's only doing authentication.

PostgreSQL is trusting any client certificate that is validated by
OpenSSL.  It's essentially trusting OpenSSL to do both authentication
and authorization, but OpenSSL isn't doing the latter.

Does PostgreSQL need to solve this?  I don't know, but it certainly
would be a nice capability to have -- if only to avoid the confusion
that currently surrounds the issue.

-- 
========================================================================
Ian Pilcher                                         arequipeno@gmail.com          Sent from the cloud -- where it's
alreadytomorrow
 
========================================================================



pgsql-hackers by date:

Previous
From: Stephen Frost
Date:
Subject: Re: Trust intermediate CA for client certificates
Next
From: Robert Haas
Date:
Subject: Re: Extension Templates S03E11