Details
-
New Feature
-
Status: Closed (View Workflow)
-
Critical
-
Resolution: Fixed
Description
Enable SSL in the server by default.
Implement ephemeral ssl certificates — if SSL is enabled but no certificates are provided by the user, let the server generate certificates in memory and use them.
FLUSH SSL should either regenerate them or simply fail or do nothing.
Attachments
Issue Links
- blocks
-
MDEV-31857 enable --ssl-verify-server-cert by default
-
- Closed
-
- causes
-
MDEV-32210 Ephemeral certificate missing DN
-
- Closed
-
-
MDEV-32229 Memory leaks while using ephemeral certificates
-
- Closed
-
-
MDEV-33430 Command line client error ERROR 2026 (HY000): TLS/SSL error: Server certificate validation failed. A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider. Error 0x800B0109(CERT_E_UNTRUSTEDROOT)
-
- Closed
-
-
MDEV-33592 Self-signed certificates are x509 Version 1, which are rejected by some TLS libraries
-
- Closed
-
- is blocked by
-
MDEV-31855 validate ssl certificates using client password
-
- Closed
-
- relates to
-
MDEV-33482 WolfSSL's math is unnecessarily slow
-
- Closed
-
-
MDEV-34372 Starting MariaDB failed with illegal instruction in WolfSSL
-
- Closed
-
It should not be necessary to make any application-level changes to handle the case where certificates are not provided by the user: TLS already supports this.
The TLS standard offers ciphersuites called DH_anon, which basically means "do a DIffie-Hellman KX to agree on a long-term symmetric key, but without verifying any server certificate. https://www.rfc-editor.org/rfc/rfc5246#appendix-C
This ciphersuite will protect against passive MITM, but not against active MITM as explained here, so it should be considered very weak against the typical threat model for Internet traffic in 2023, which includes pervasive active MITMs.