Re: RFC 9266: Channel Bindings for TLS 1.3 support

From: Jacob Champion <jacob(dot)champion(at)enterprisedb(dot)com>
To: Nico Williams <nico(at)cryptonector(dot)com>
Cc: Heikki Linnakangas <hlinnaka(at)iki(dot)fi>, "* Neustradamus *" <neustradamus(at)hotmail(dot)com>, PostgreSQL Hackers <pgsql-hackers(at)lists(dot)postgresql(dot)org>
Subject: Re: RFC 9266: Channel Bindings for TLS 1.3 support
Date: 2025-11-21 19:42:41
Message-ID: CAOYmi+=T=Cx1ksUc-U1K22_=VzgP7_Bh1nMuYj7vyNzMKYBh7g@mail.gmail.com
Views: Whole Thread | Raw Message | Download mbox | Resend email
Thread:
Lists: pgsql-hackers

On Fri, Nov 21, 2025 at 11:17 AM Nico Williams <nico(at)cryptonector(dot)com> wrote:
> Well, you're right that if we're talking about a Heartbleed type leak
> then what I said does not follow. However loss of the TLS server
> credential's private keys is still close enough to catastrophic.

Sure, but it's nice that SCRAM (the only thing we use bindings for at
the moment) makes it slightly less catastrophic. I just wanted to make
sure that the property of "attacker must have the private key and the
SCRAM verifiers to fully masquerade" had not collapsed into "private
key is sufficient" for some reason.

> That reminds me of another motivation for channel binding: protection
> against wayward CAs. In the WebPKI this is reasonably well accomplished
> by certificate transparency, but it's still nice to be able to use CB to
> protect against that. In corporate networks (where PG is mostly
> deployed, no?) this is not that interesting a consideration.

"Mostly" is probably still accurate? But WebPKI is more important for
us than it used to be, I think. (And with the recent demise of OCSP,
additional server authentication factors may help fill the gap for
some people, maybe?)

Thanks!
--Jacob

In response to

Responses

Browse pgsql-hackers by date

  From Date Subject
Next Message Nico Williams 2025-11-21 19:52:01 Re: Optimize cardinality estimation when unique keys are fully covered
Previous Message Greg Burd 2025-11-21 19:40:37 Re: [PATCH] Fix ARM64/MSVC atomic memory ordering issues on Win11 by adding explicit DMB barriers