Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

TLS Is Rockstar Tech #20

Open
thomasmitchell opened this issue Jan 19, 2018 · 1 comment
Open

TLS Is Rockstar Tech #20

thomasmitchell opened this issue Jan 19, 2018 · 1 comment

Comments

@thomasmitchell
Copy link

Forcing people to send database information unencrypted over the wire seems bad. Let's fix it.

First, terminate incoming client TLS at the pgpool layer.
http://www.pgpool.net/docs/latest/en/html/runtime-ssl.html#RUNTIME-CONFIG-SSL-SETTINGS

ssl_key (string)
Specifies the path to the private key file to be used for incoming frontend connections. There is no default value for this option, and if left unset SSL will be disabled for incoming frontend connections.

This parameter can only be set at server start.

ssl_cert (string)
Specifies the path to the public x509 certificate file to be used for the incoming frontend connections. There is no default value for this option, and if left unset SSL will be disabled for incoming frontend connections.

This parameter can only be set at server start.

ssl_ca_cert (string)
Specifies the path to a PEM format CA certificate files, which can be used to verify the backend server certificates. This is analogous to the -CApath option of the OpenSSL verify(1) command.

This parameter can only be set at server start.

Also, make sure TLS between PGPool and the Postgres backends and between Postgres replication nodes is the thing.

Here's a thing I googled: https://evol-monkey.blogspot.com/2015/10/postgresql-94-streaming-replication.html

Also, TLS should be optional. Just because we think the user should definitely be using encryption doesn't mean that the boshrelease has to think it too.

@jhunt jhunt self-assigned this Jan 20, 2018
@jhunt jhunt removed their assignment Feb 2, 2020
@jhunt
Copy link
Contributor

jhunt commented Feb 12, 2020

@tpoland: poke-ity poke-poke

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants