| From: | Nico Williams <nico(at)cryptonector(dot)com> |
|---|---|
| To: | Jacob Champion <jacob(dot)champion(at)enterprisedb(dot)com> |
| Cc: | Heikki Linnakangas <hlinnaka(at)iki(dot)fi>, * Neustradamus * <neustradamus(at)hotmail(dot)com>, PostgreSQL Hackers <pgsql-hackers(at)lists(dot)postgresql(dot)org> |
| Subject: | Re: RFC 9266: Channel Bindings for TLS 1.3 support |
| Date: | 2025-11-21 19:57:38 |
| Message-ID: | aSDEMjocDUMdjh7w@ubby |
| Views: | Whole Thread | Raw Message | Download mbox | Resend email |
| Thread: | |
| Lists: | pgsql-hackers |
On Fri, Nov 21, 2025 at 11:42:41AM -0800, Jacob Champion wrote:
> On Fri, Nov 21, 2025 at 11:17 AM Nico Williams <nico(at)cryptonector(dot)com> wrote:
> > Well, you're right that if we're talking about a Heartbleed type leak
> > then what I said does not follow. However loss of the TLS server
> > credential's private keys is still close enough to catastrophic.
>
> Sure, but it's nice that SCRAM (the only thing we use bindings for at
> the moment) makes it slightly less catastrophic. I just wanted to make
> sure that the property of "attacker must have the private key and the
> SCRAM verifiers to fully masquerade" had not collapsed into "private
> key is sufficient" for some reason.
That's a fair take.
(I'm very down on SCRAM. I'd much rather have an asymmetric zero-
knowledge PAKE.)
> > That reminds me of another motivation for channel binding: protection
> > against wayward CAs. In the WebPKI this is reasonably well accomplished
> > by certificate transparency, but it's still nice to be able to use CB to
> > protect against that. In corporate networks (where PG is mostly
> > deployed, no?) this is not that interesting a consideration.
>
> "Mostly" is probably still accurate? But WebPKI is more important for
Correct. CT is not a silver bullet.
> us than it used to be, I think. (And with the recent demise of OCSP,
> additional server authentication factors may help fill the gap for
> some people, maybe?)
Fair enough, as more public cloud PG offerings come along, WebPKI will
matter more to PG.
I wonder if DANE (DNS-based Authentication of Named Entities [RFC 6698])
might be a good idea for PG. IMO DANE is a great idea in general, but
browser communities do not agree yet (for reasons, often to do with
performance, which I think by and large do not apply to PG).
Nico
--
| From | Date | Subject | |
|---|---|---|---|
| Next Message | Tom Lane | 2025-11-21 20:14:15 | Re: should we have a fast-path planning for OLTP starjoins? |
| Previous Message | Bruce Momjian | 2025-11-21 19:57:35 | Re: Changing the state of data checksums in a running cluster |