[MDEV-19578] Test whether file_key_management_encryption_algorithm=AES_CTR works properly with wolfSSL Created: 2019-05-23 Updated: 2019-05-31 Resolved: 2019-05-31 |
|
| Status: | Closed |
| Project: | MariaDB Server |
| Component/s: | Encryption, SSL |
| Fix Version/s: | 10.4.6 |
| Type: | Task | Priority: | Major |
| Reporter: | Geoff Montee (Inactive) | Assignee: | Vladislav Vaintroub |
| Resolution: | Done | Votes: | 0 |
| Labels: | None | ||
| Issue Links: |
|
||||||||
| Description |
|
The file_key_management plugin enables file_key_management_encryption_algorithm=AES_CTR at compile time if the TLS library supports AES-CTR: However, when this option is set, the plugin might actually use either AES-CTR or AES-GCM, depending on the situation:
After https://github.com/MariaDB/server/blob/592fe954ef82be1bc08b29a8e54f7729eb1e1343/cmake/ssl.cmake#L59 Since wolfSSL doesn't support AES-GCM, it looks looks like the plugin will use AES-CTR in the cases where it would usually use AES-GCM, if the TLS library were OpenSSL: Do we need to test whether file_key_management_encryption_algorithm=AES_CTR will work properly with wolfSSL? Will this difference support migrations where the original server used OpenSSL, and the new server used wolfSSL (or vice-versa)? Or is AES-GCM only used in cases where the files won't be needed beyond server restarts? |
| Comments |
| Comment by Vladislav Vaintroub [ 2019-05-31 ] |
|
AES-CTR would work differently from OpenSSL, the unit test aes-t would fail due to different length of encrypted data compared to OpenSSL, and thus CTR is now disabled with WolfSSL, just as it was the case for YASSL |