Craig Ringer <cr...@postnewspapers.com.au> writes:
> On 27/05/10 10:21, Tom Lane wrote:
>> What will happen as things stand is that all the certs get loaded
>> into a common pool.  That's not too horrible as long as there are
>> not actual conflicts, but it could mean that for example some
>> connections trust CA certs that the app programmer expected to only
>> be trusted for other connections.  I did arrange (and test) that the
>> client cert and key are local to each connection, but leakage of
>> trusted root certs is a different story.

>> We could avoid this problem if we were willing to set up a separate
>> SSL_context for each connection, but I'm not sure if it's worth that.
>> The scenario where a single application process is managing multiple
>> distinct sets of trusted certs seems a bit far-fetched anyway.

> OpenSSL really doesn't seem to be designed for multiple truly 
> independent SSL contexts. The SSL context stuff has clearly been hacked 
> on after the fact to a library that started out having only one global 
> state, and it's pretty incomplete. I'm honestly not sure it's worth 
> trying to allow per-connection trust going, especially as (AFAIK) 
> there's no evidence that anybody _wants_ per-client-connection SSL trust 
> anyway.

Precisely.  I'm not excited about doing anything about this in the near
term, or even the not-so-near term.  I just wanted to get the
information into the PG archives in case it ever does become
significant.

                        regards, tom lane

-- 
Sent via pgsql-hackers mailing list (pgsql-hackers@postgresql.org)
To make changes to your subscription:
http://www.postgresql.org/mailpref/pgsql-hackers

Reply via email to