-
Notifications
You must be signed in to change notification settings - Fork 3.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
security: remove the node TLS client cert exemption #71134
Conversation
this doesn't work, as explained here #71102 (comment) |
@andy-kimball can you also check the sql proxy test changes here thanks |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Reviewable status: complete! 0 of 0 LGTMs obtained (waiting on @andy-kimball, @bdarnell, @catj-cockroach, and @knz)
pkg/ccl/sqlproxyccl/proxy_handler_test.go, line 1041 at r1 (raw file):
te.setAuthenticated(false) te.setErrToClient(nil) t.Logf("WOO %q", url)
nit: Remove this log line or make it more informative if it should stay.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Reviewed 5 of 5 files at r1, all commit messages.
Reviewable status: complete! 0 of 0 LGTMs obtained (waiting on @andy-kimball, @bdarnell, and @knz)
ed821ba
to
608c15b
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Reviewable status: complete! 0 of 0 LGTMs obtained (waiting on @andy-kimball, @bdarnell, and @catj-cockroach)
pkg/ccl/sqlproxyccl/proxy_handler_test.go, line 1041 at r1 (raw file):
Previously, chrisseto (Chris Seto) wrote…
nit: Remove this log line or make it more informative if it should stay.
Done
d085991
to
4eca33c
Compare
The test changes LGTM. |
This patch also fixes the TestComposeGSSPython test. Release note (security update): It is not possible any more to use a node TLS certificate to establish a SQL connection with another username than `node`. This facility had existed as an "escape hatch" so that an operator could use the node cert to perform operations on behalf of another SQL user. However, this facility is not necessary: an operator with access to a node cert can log in as `node` directly and create new credentials for another user anyway. By removing this facility, we tighten the guarantee that the principal in the TLS client cert always matches the SQL identity.
ok the tests pass now I think bors r=catj-cockroach,andy-kimball |
Build succeeded: |
The RSA key size used by TLS certs for acceptance tests must be at least 2048 to please OpenSSL (which is used by libpq in tests). The previous PR cockroachdb#71134 had improved this for some cases but the chance was hidden in-between other things. This commit makes it clearer what is going on. Release note: None
The RSA key size used by TLS certs for acceptance tests must be at least 2048 to please OpenSSL (which is used by libpq in tests). The previous PR cockroachdb#71134 had improved this for some cases but the chance was hidden in-between other things. This commit makes it clearer what is going on. Release note: None
The RSA key size used by TLS certs for acceptance tests must be at least 2048 to please OpenSSL (which is used by libpq in tests). The previous PR cockroachdb#71134 had improved this for some cases but the chance was hidden in-between other things. This commit makes it clearer what is going on. Release note: None
The RSA key size used by TLS certs for acceptance tests must be at least 2048 to please OpenSSL (which is used by libpq in tests). The previous PR cockroachdb#71134 had improved this for some cases but the chance was hidden in-between other things. This commit makes it clearer what is going on. Release note: None
81727: acceptance: comply with openssl key size restrictions r=rickystewart a=knz The RSA key size used by TLS certs for acceptance tests must be at least 2048 to please OpenSSL (which is used by libpq in tests). The previous PR #71134 had improved this for some cases but the chance was hidden in-between other things. This commit makes it clearer what is going on. Release note: None Co-authored-by: Raphael 'kena' Poss <[email protected]>
Fixes #71102.
Release note (security update): It is not possible any more to use a
node TLS certificate to establish a SQL connection with another
username than
node
. This facility had existed as an "escape hatch"so that an operator could use the node cert to perform operations on
behalf of another SQL user. However, this facility is not necessary:
an operator with access to a node cert can log in as
node
directlyand create new credentials for another user anyway. By removing
this facility, we tighten the guarantee that the principal in the TLS
client cert always matches the SQL identity.