On Wed, Feb 17, 2021 at 06:34:36PM +0000, Jacob Champion wrote: > This would only affect threaded libpq clients running OpenSSL 1.0.2 and > below, and it looks like the most likely code path to be affected is > the OpenSSL error stack. So if anything went wrong with one of those > hash calls, it's possible that libpq would crash (or worse, silently > misbehave somewhere in the TLS stack) instead of gracefully reporting > an error. [2] is an example of this in the wild.
I have been discussing a bit this issue with Jacob, and that's a problem we would need to address on HEAD. First, I have been looking at this stuff in older versions with MD5 and SHA256 used by SCRAM when it comes to ~13 with libpq: - MD5 is based on the internal implementation of Postgres even when building libpq with OpenSSL, so that would not be an issue. - SHA256 is a different story though, because when building with OpenSSL we would go through SHA256_{Init,Update,Final} for SCRAM authentication. In the context of a SSL connection, the crypto part is initialized. But that would *not* be the case of a connection in a non-SSL context. Fortunately, and after looking at the OpenSSL code (fips_md_init_ctx, HASH_UPDATE, etc.), there is no sign of locking handling or errors, so I think that we are safe there. Now comes the case of HEAD that uses EVP for MD5 and SHA256. A SSL connection would initialize the crypto part, but that does not happen for a non-SSL connection. So, logically, one could run into issues if using MD5 or SCRAM with OpenSSL <= 1.0.2 (pgbench with a high number of threads does not complain by the way), and we are not yet in a stage where we should drop this version either, even if it has been EOL'd by upstream at the end of 2019. We have the code in place to properly initialize the crypto locking in libpq with ENABLE_THREAD_SAFETY, but the root of the issue is that the SSL and crypto initializations are grouped together. What we need to do here is to split those phases of the initialization so as non-SSL connections can use the crypto part properly, as pqsecure_initialize gets only called now when libpq negotiates SSL with the postmaster. It seems to me that we should make sure of a proper reset of the crypto part within pqDropConnection(), while the initialization needs to happen in PQconnectPoll(). -- Michael
signature.asc
Description: PGP signature