> On 25 Apr 2025, at 15:40, George MacKerron <geo...@mackerron.co.uk> wrote:
> 
>> On 25 Apr 2025, at 13:53, Daniel Gustafsson <dan...@yesql.se> wrote:
>>> 
>>>> (2) sslrootcert=system on Windows doesn’t do a thing that would be 
>>>> extremely useful in some common situations. Namely: connecting securely to 
>>>> servers that present a certificate signed by a public CA.
>>> 
>>> Just to be clear, does (2) happens when the OpenSSL installation has a bogus
>>> OPENSSLDIR value, or does it happen regardless?
>> 
>> I would still like to get clarity on this, do you have any insights here?
> 
> I can tell you what happens on my Windows 11 system with Postgres 17 via the 
> EDB installer, which has a non-bogus OPENSSLDIR.

Thanks for confirming.

> OpenSSL appears to have been built with OPENSSLDIR="C:\Program Files\Common 
> Files\SSL".
> 
> This is a valid path, the directory exists, and it contains a few *.cnf 
> files. I’m pretty sure the EDB installer created..

It did, CVE-2019-10211 has more details.

> ..and populated this directory.

The contents most likely come from building OpenSSL, by the sounds of it that's
the stock OPENSSLDIR setup.

--
Daniel Gustafsson



Reply via email to