Re: [PATCH] Documentation bug related to client authentication usingTLS certificate - Mailing list pgsql-hackers

From Chris Bandy
Subject Re: [PATCH] Documentation bug related to client authentication usingTLS certificate
Date
Msg-id 6ecb3825-ac9a-e1c0-9324-29cb771f65e9@gmail.com
Whole thread Raw
In response to [PATCH] Documentation bug related to client authentication usingTLS certificate  (Cary Huang <cary.huang@highgo.ca>)
Responses Re: [PATCH] Documentation bug related to client authenticationusing TLS certificate
List pgsql-hackers
Hi, Cary.

On 3/2/20 1:06 PM, Cary Huang wrote:
> Hi
> 
> I found a document bug about client authentication using TLS 
> certificate. When clientcert authentication is enabled in pg_hba.conf, 
> libpq does not verify that the *common name*in certificate 
> matches*database username*like it is described in the documentation 
> before allowing client connection.
> 
> Instead, when sslmode is set to “verify-full”, libpq will verify if the 
> *server host name*matches the *common name *in client certificate.

This sounds incorrect. My understanding is that the *server* host name 
is always matched with the *server* common name.

  When
> sslmode is set to “verify-ca”, libpq will verify that the client is 
> trustworthy by checking the certificate trust chain up to the root 
> certificate and it does not verify *server hostname*and 
> certificate*common name *match in this case.

Similarly, libpq will verify the *server* is trustworthy by checking the 
*server* certificate up to the root. It does not verify that the host 
name matches the common name in the *server* certificate.

In all cases, libpq is responsible for verifying the *server* is who it 
claims to be.

-- Chris



pgsql-hackers by date:

Previous
From: Tom Lane
Date:
Subject: Re: Symbolic names for the values of typalign and typstorage
Next
From: Fujii Masao
Date:
Subject: Re: First WAL segment file that initdb creates