Firm

Results 11 comments of Firm

Check https://github.com/andrsharaev/xt_NAT/pull/2/commits.

Even more after setting PGSSLMODE to require psql fails to establish TLS connection to odyssey. Dump shows that odyssey replies with handshake failure after receiving client hello from psql.

Hi, ``` root@odyssey# /usr/local/bin/odyssey -V odyssey (git: 1965 5d129fa release) root@odyssey# psql -V psql (PostgreSQL) 13.3 (Ubuntu 13.3-1.pgdg20.10+1) root@odyssey# psql -h mydb -d test -U test Password for user test:...

Not only from odyssey to remote server but from psql to odyssey too. By default, psql downgrades to unencrypted communication if tls connection couldn't be established. If you change `tls...

I was able to turn on tls connection between client and odyssey by providing tls_ca_file, tls_cert_file and tls_key_file directives in `listen {}` section. But tls connection between odyssey and postgresql...

I updated third_party/machinarium/sources/tls.c in order to include detailed description of `SSL_get_verify_result()` error code. So I ended with `SSL_get_verify_result(): self signed certificate in certificate chain`. My storage uses certificate that was...

Pull request [https://github.com/yandex/odyssey/pull/431](https://github.com/yandex/odyssey/pull/431)

> I updated third_party/machinarium/sources/tls.c in order to include detailed description of `SSL_get_verify_result()` error code. So I ended with `SSL_get_verify_result(): self signed certificate in certificate chain`. > > My storage uses...

> @[pratikbin](https://github.com/pratikbin), try to explicitly set `tls "disable"` in `listen` configuration block.