Re: TLS 1.0 - Mailing list pgsql-general

From Steve Crawford
Subject Re: TLS 1.0
Date
Msg-id CAEfWYyxweWLcCXpdZRbEHA303_UGtnS62-Bb1dzyqfYLLxJzSg@mail.gmail.com
Whole thread Raw
In response to Re: TLS 1.0  (Tom Lane <tgl@sss.pgh.pa.us>)
List pgsql-general
From a security audit point of view, also consider the fact that 9.6 is end-of-life in 3 months.

-Steve

On Fri, Aug 6, 2021 at 9:46 AM Tom Lane <tgl@sss.pgh.pa.us> wrote:
Ehtesham Pradhan <ehtesham.pradhan@lookout.com> writes:
> Our client is using  Version : PostgreSQL 9.6.17 , they have done vulnerability
> assessment and found that :

>    - TLS version 1.0 Protocol detection
>    - The remote service encrypt traffic with older version of TLS

This is mostly a matter of whether the OpenSSL libraries being used on
both ends are up-to-date.  If you were using PG 12 or later you could
set the server parameter ssl_min_protocol_version to enforce whatever
policy you want about minimum TLS version.  But in 9.6.x it's going
to be strictly a matter of what OpenSSL wants to do.  Check the
system-wide OpenSSL configuration on each end, and update OpenSSL
if necessary.  At least with reasonably modern OpenSSL, you should
be able to enforce a minimum TLS version in OpenSSL's config
(see MinProtocol).

                        regards, tom lane


pgsql-general by date:

Previous
From: Tom Lane
Date:
Subject: Re: TLS 1.0
Next
From: Matthias Apitz
Date:
Subject: Re: PostgreSQL reference coffee mug