Re: Experiments with Postgres and SSL - Mailing list pgsql-hackers

From Greg Stark
Subject Re: Experiments with Postgres and SSL
Date
Msg-id CAM-w4HPL8AJL64gbJZprmN2hKN=k0Vr+HN8U+7mtqjW0AzF+gg@mail.gmail.com
Whole thread Raw
In response to Re: Experiments with Postgres and SSL  (Greg Stark <stark@mit.edu>)
Responses Re: Experiments with Postgres and SSL  (Greg Stark <stark@mit.edu>)
List pgsql-hackers
On Mon, 20 Mar 2023 at 16:31, Greg Stark <stark@mit.edu> wrote:
>
> Here's a first cut at ALPN support.
>
> Currently it's using a hard coded "Postgres/3.0" protocol

Apparently that is explicitly disrecommended by the IETF folk. They
want something like "TBD" so people don't start using a string until
it's been added to the registry. So I've changed this for now (to
"TBD-pgsql")

Ok, I think this has pretty much everything I was hoping to do.

The one thing I'm not sure of is it seems some codepaths in postmaster
have ereport(COMMERROR) followed by returning an error whereas other
codepaths just have ereport(FATAL). And I don't actually see much
logic in which do which. (I get the principle behind COMMERR it just
seems like it doesn't really match the code).

I realized I had exactly the infrastructure needed to allow pipelining
the SSL ClientHello like Neon wanted to do so I added that too. It's
kind of redundant with direct SSL connections but seems like there may
be reasons to use that instead.



-- 
greg

Attachment

pgsql-hackers by date:

Previous
From: "Fujii.Yuki@df.MitsubishiElectric.co.jp"
Date:
Subject: RE: Partial aggregates pushdown
Next
From: Jeff Davis
Date:
Subject: Re: running logical replication as the subscription owner