Re: SSL tests failing with "ee key too small" error on Debian SID - Mailing list pgsql-hackers

From Thomas Munro
Subject Re: SSL tests failing with "ee key too small" error on Debian SID
Date
Msg-id CAEepm=0=9BW5ZgEsk_5_fGarDtVGR8NguKg1VEyZo_J3aQv4Ng@mail.gmail.com
Whole thread Raw
In response to Re: SSL tests failing with "ee key too small" error on Debian SID  (Michael Paquier <michael@paquier.xyz>)
Responses Re: SSL tests failing with "ee key too small" error on Debian SID  (Michael Paquier <michael@paquier.xyz>)
List pgsql-hackers
On Wed, Oct 3, 2018 at 1:32 PM Michael Paquier <michael@paquier.xyz> wrote:
> On Mon, Oct 01, 2018 at 09:18:01PM +0900, Kyotaro HORIGUCHI wrote:
> > The attached second patch just changes key size to 2048 bits and
> > "ee key too small" are eliminated in 001_ssltests_master, but
> > instead I got "ca md too weak" error. This is eliminated by using
> > sha256 instead of sha1 in cas.config. (third attached)
>
> I find your suggestion quite tempting at the end instead of having to
> tweak the global system's configuration.  That should normally work with
> any configuration.  This would require regenerating the certs in the
> tree.  Any thoughts from others?

I don't really have opinion here, but I wanted to point out that
src/test/ldap/t/001_auth.pl creates new certs on the fly, which is a
bit inconsistent with the SSL test's approach of certs-in-the-tree.
Which is better?

-- 
Thomas Munro
http://www.enterprisedb.com


pgsql-hackers by date:

Previous
From: Michael Paquier
Date:
Subject: Re: allow online change primary_conninfo
Next
From: Michael Paquier
Date:
Subject: Re: pgsql: Integrate recovery.conf into postgresql.conf