Well, the problem is – as so often – that Maxscale does things slightly different than the server and its bundled tools, just enough to be totally confusing and breaking the "principle of least surprise"
On the server/tools side we always have basic certificate verification enabled, the
{ssl_verify_server_cert}
option only configures whether the server name a client requested to connect to matches the server name certification (either a SAN entry, or Subject/CN if no SAN extension entry exists), and this specific verification option is off by default.
The Maxscale
{tls_verify_server_cert}
setting on the other hand seems to be an all-or-nothing setting, it is on by default, and when turned off it will not verify certificates whatsoever, so even certificates with invalid CA chain or outside of their valid date range will be accepted. But there does not seem to be an option that works the same as on the server side that turns off server host name verification only.
And so we have two very similarly named options that do subtly – and actually critically – different things, and the functionality we are used to have on the server side – disabling name verification only – does not even seem to exist on the Maxscale side.
Not sure how to solve this naming issue "after the fact" though, I wished such things would be coordinated between dev teams beforehand ...
I just learned that maxscale tls-verify-server-cert is not the same as the ssl-verify-server-cert option of server command line tools.
Server tools always check the CA chain and whether the current datetime is between the "valid from" and "valid until" timestamps, the ssl-verify-server-cert option only activates the extra server name verification step where the server name the client connected to is checked against the SAN (Server Alternative Names) list in the certificate returned by the server, or the CN (Common Name) entry in the certificate Subject field in absence of the x509 v3 SAN extension.