-
Notifications
You must be signed in to change notification settings - Fork 3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Kingfisher: PostgresSQL sslmode=verify-full #152
Comments
Using We can already use
Where It's easy to similarly configure Redash at, for example, https://redash.open-contracting.org/data_sources/5 Since we want to remain flexible and generally identify services rather than servers, I'll close this issue as unplanned. The only case (with respect to PostgreSQL) where we identify the server is between the replica and main servers (they use the Docs: https://www.postgresql.org/docs/current/ssl-tcp.html I had added these states while exploring this, before realizing that
|
…to PostgreSQL if replacing default cert and using verify-full) #152
We are changing
pg_hba.conf
to require SSL for remote connections, effectively changing clients from the default sslmode=prefer to the stronger sslmode=require.To prevent man-in-the-middle (MITM) attacks, we'd need to use sslmode=verify-full, but this requires clients to configure
sslcert and sslkeysslrootcert
connection parameters.All other connections are local. If we move Kingfisher Process or Views to a different server than the database, they can be configured to use sslmode=verify-full.
A quick search turns up this article on how to do it with Docker. I figure the steps would be quite similar for a traditional deployment: https://info.crunchydata.com/blog/ssl-certificate-authentication-postgresql-docker-containers
The text was updated successfully, but these errors were encountered: