From: | Jacob Champion <pchampion(at)vmware(dot)com> |
---|---|
To: | Daniel Gustafsson <daniel(at)yesql(dot)se> |
Cc: | Heikki Linnakangas <hlinnaka(at)iki(dot)fi>, Andres Freund <andres(at)anarazel(dot)de>, Postgres hackers <pgsql-hackers(at)lists(dot)postgresql(dot)org>, Michael Paquier <michael(at)paquier(dot)xyz>, Andrew Dunstan <andrew(dot)dunstan(at)2ndquadrant(dot)com>, Stephen Frost <sfrost(at)snowman(dot)net>, Thomas Munro <thomas(dot)munro(at)gmail(dot)com> |
Subject: | Re: Support for NSS as a libpq TLS backend |
Date: | 2020-12-04 00:57:26 |
Message-ID: | BB748015-45A4-4A43-B740-289E5592CA08@vmware.com |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-hackers |
On Nov 17, 2020, at 7:00 AM, Daniel Gustafsson <daniel(at)yesql(dot)se> wrote:
>
> Nice, thanks for the fix! I've incorporated your patch into the attached v20
> which also fixes client side error reporting to be more readable.
I was testing handshake failure modes and noticed that some FATAL
messages are being sent through to the client in cleartext. The OpenSSL
implementation doesn't do this, because it logs handshake problems at
COMMERROR level. Should we switch all those ereport() calls in the NSS
be_tls_open_server() to COMMERROR as well (and return explicitly), to
avoid this? Or was there a reason for logging at FATAL/ERROR level?
Related note, at the end of be_tls_open_server():
> ...
> port->ssl_in_use = true;
> return 0;
>
> error:
> return 1;
> }
This needs to return -1 in the error case; the only caller of
secure_open_server() does a direct `result == -1` comparison rather than
checking `result != 0`.
--Jacob
From | Date | Subject | |
---|---|---|---|
Next Message | Fujii Masao | 2020-12-04 01:21:35 | Re: Add Information during standby recovery conflicts |
Previous Message | Peter Smith | 2020-12-04 00:55:46 | Re: [HACKERS] logical decoding of two-phase transactions |