On 26/05/10 10:25, Stephen Frost wrote:

>>> In any case I'm thinking that we need to document how to set up
>>> configurations with chains of CA certs.
>>
>> Yes, and patch the server to send the list of trusted CAs to the client
>> during client certificate negotiaton to fix #5468 .
> 
> Agreed.

A quick update on my own testing:

I've found that the Sun PKCS#12 keystore provider behaves just like
OpenSSL. It unconditionally sends the one and only client cert it has to
the server - after all, there's only one to choose from. This is a royal
pain to use, though, and requires the app's security to be configured
from the command line at each launch, or the app to override all user
settings and thus disable use of PKCS#11 hardware keys, etc.

The issue only arises if there is a keystore in use where the client may
have more than one client certificate/key availible to it and must pick
which one to send to the server. This is true of the default Sun JKS
keystore format, and for PKCS#11 stores like hardware crypto keys.

My self-contained test case will demonstrate both PKCS#12 file and JKS
keystore cases. Give me a bit to put it all together and you'll have
something you can play with, watch chat on the network, etc.

-- 
Craig Ringer

Tech-related writing: http://soapyfrogs.blogspot.com/

-- 
Sent via pgsql-bugs mailing list (pgsql-bugs@postgresql.org)
To make changes to your subscription:
http://www.postgresql.org/mailpref/pgsql-bugs

Reply via email to