On Tue, Oct 21, 2008 at 11:55:32AM +0100, Gregory Stark wrote: > Martijn van Oosterhout <[EMAIL PROTECTED]> writes: > > > You seem to be making the assertion that making an encrypted connection > > to an untrusted server is worse than making a plaintext connection to > > an untrusted server, which seems bogus to me. > > Hm, is it? If you use good old traditional telnet you know you're typing on an > insecure connection. If you use ssh you expect it to be secure and indeed ssh > throws up big errors if it fails to get a secure connection -- it doesn't > silently fall back to an insecure connection.
SSH is a good example, it only works with self-signed certificates, and relies on the client to check it. Libpq provides a mechanism for the client to verify the server's certificate, and that is safe even if it is self-signed. If the client knows the certificate the server is supposed to present, then you can't have a man-in-the-middle attack, right? Whether it's self-signed or not is irrelevent. Preventing casual snooping without preventing MitM is a rational choice for system administrators. Have a nice day, -- Martijn van Oosterhout <[EMAIL PROTECTED]> http://svana.org/kleptog/ > Please line up in a tree and maintain the heap invariant while > boarding. Thank you for flying nlogn airlines.
signature.asc
Description: Digital signature