diff options
author | unknown <jimw@mysql.com> | 2006-04-11 18:54:24 -0700 |
---|---|---|
committer | unknown <jimw@mysql.com> | 2006-04-11 18:54:24 -0700 |
commit | a422d6da4ae24944cd5af34c5e74d62bfbdad14a (patch) | |
tree | 24f79d4012d38ba95416a1379bdf4c392e02e0cb /SSL/NOTES | |
parent | b711579f2bc0eaeb2352998a0ecba548090f78c0 (diff) | |
download | mariadb-git-a422d6da4ae24944cd5af34c5e74d62bfbdad14a.tar.gz |
Remove old cruft from the tree: mysqltestmanager, mysql_test_run_new,
and various stuff in Docs/. Also move the certificates used for testing
into mysql-test/std_data from the top-level SSL directory (now gone).
BitKeeper/deleted/.del-init_db.sql~af2dfeabaa348dd7:
Delete: mysql-test/init_db.sql
BitKeeper/deleted/.del-my_create_tables.c~c121a0c4c427ebb:
Delete: mysql-test/my_create_tables.c
BitKeeper/deleted/.del-my_manage.c~4de50e721d227d19:
Delete: mysql-test/my_manage.c
BitKeeper/deleted/.del-my_manage.h~9d2cbc1e8bc894f:
Delete: mysql-test/my_manage.h
BitKeeper/deleted/.del-mysql_test_run_new.c~a23ab2c4b28b25ad:
Delete: mysql-test/mysql_test_run_new.c
mysql-test/mysql-test-run.sh:
Remove code that uses old mysqltestmanager
BitKeeper/deleted/.del-Makefile.am~abb265028eb9b6a7:
Delete: tools/Makefile.am
BitKeeper/deleted/.del-managertest1.nc~96a5c1c5c2d33085:
Delete: tools/managertest1.nc
BitKeeper/deleted/.del-mysqlmanager-sample.pwd~712b89f01aaad84a:
Delete: tools/mysqlmanager-sample.pwd
BitKeeper/deleted/.del-mysqlmanager.c~e97636d71145a0b:
Delete: tools/mysqlmanager.c
BitKeeper/deleted/.del-client-req.pem~efd482e1d290d4d8:
Delete: SSL/client-req.pem
BitKeeper/deleted/.del-run-client~e683192d4f3821e0:
Delete: SSL/run-client
BitKeeper/deleted/.del-server-req.pem~16301893cacf1be4:
Delete: SSL/server-req.pem
BitKeeper/deleted/.del-run-server~55426778bc206c48:
Delete: SSL/run-server
BitKeeper/deleted/.del-Makefile.am~de166d6fcac3b9b6:
Delete: SSL/Makefile.am
BitKeeper/deleted/.del-NOTES~e926d3e6929ac052:
Delete: SSL/NOTES
BitKeeper/deleted/.del-mysqlmanager-pwgen.c~d8f5f91ec54432b9:
Delete: client/mysqlmanager-pwgen.c
BitKeeper/deleted/.del-mysqlmanagerc.c~4f6e3499e68508f6:
Delete: client/mysqlmanagerc.c
BitKeeper/deleted/.del-algor.eps~1a57aff065918206:
Delete: Docs/Books/algor.eps
BitKeeper/deleted/.del-bk.txt~ffd510fa9531f87c:
Delete: Docs/bk.txt
BitKeeper/deleted/.del-algor.gif~72c40c3bad198f2f:
Delete: Docs/Books/algor.gif
BitKeeper/deleted/.del-algor.txt~37d2b5c1290e3cfa:
Delete: Docs/Books/algor.txt
BitKeeper/deleted/.del-dbi.eps~7b1032f98de7736d:
Delete: Docs/Books/dbi.eps
BitKeeper/deleted/.del-dbi.gif~8f6861147437298b:
Delete: Docs/Books/dbi.gif
BitKeeper/deleted/.del-dbi.txt~f5cf3fe321168fd5:
Delete: Docs/Books/dbi.txt
BitKeeper/deleted/.del-dubois.eps~f24e09a7fa420436:
Delete: Docs/Books/dubois.eps
BitKeeper/deleted/.del-dubois.gif~e02d361b13b1c4a4:
Delete: Docs/Books/dubois.gif
BitKeeper/deleted/.del-dubois.txt~998581cf9040fcc:
Delete: Docs/Books/dubois.txt
BitKeeper/deleted/.del-ecomm.eps~17833026ebd7656:
Delete: Docs/Books/ecomm.eps
BitKeeper/deleted/.del-ecomm.gif~f9bce6949b171613:
Delete: Docs/Books/ecomm.gif
BitKeeper/deleted/.del-ecomm.txt~27494674104ee9db:
Delete: Docs/Books/ecomm.txt
BitKeeper/deleted/.del-in_21.eps~8150d06653dab178:
Delete: Docs/Books/in_21.eps
BitKeeper/deleted/.del-in_21.gif~4a0b14f6d76458a9:
Delete: Docs/Books/in_21.gif
BitKeeper/deleted/.del-in_21.txt~448fb4b3d8c0b34e:
Delete: Docs/Books/in_21.txt
BitKeeper/deleted/.del-manual.eps~1c2ebcea50b4840c:
Delete: Docs/Books/manual.eps
BitKeeper/deleted/.del-manual.gif~657cf08119b1b3fc:
Delete: Docs/Books/manual.gif
BitKeeper/deleted/.del-manual.txt~4702af61ea5e3c29:
Delete: Docs/Books/manual.txt
BitKeeper/deleted/.del-msql.eps~f3801b9d166ae4fc:
Delete: Docs/Books/msql.eps
BitKeeper/deleted/.del-msql.gif~72ea7c6d307b9108:
Delete: Docs/Books/msql.gif
BitKeeper/deleted/.del-msql.txt~235ae568824f4073:
Delete: Docs/Books/msql.txt
BitKeeper/deleted/.del-prof.eps~1f54d9a56eb2b908:
Delete: Docs/Books/prof.eps
BitKeeper/deleted/.del-prof.gif~2fa8ed201d9d05fe:
Delete: Docs/Books/prof.gif
BitKeeper/deleted/.del-prof.txt~9fc04ec3e5ce8361:
Delete: Docs/Books/prof.txt
BitKeeper/deleted/.del-pthreads.eps~2ca8ff2d1181b2c0:
Delete: Docs/Books/pthreads.eps
BitKeeper/deleted/.del-pthreads.gif~2d9460dec2577859:
Delete: Docs/Books/pthreads.gif
BitKeeper/deleted/.del-pthreads.txt~fc9e17d021335a39:
Delete: Docs/Books/pthreads.txt
BitKeeper/deleted/.del-realmen.eps~cc022325d3cb045:
Delete: Docs/Books/realmen.eps
BitKeeper/deleted/.del-realmen.gif~86113e3b1fcbd597:
Delete: Docs/Books/realmen.gif
BitKeeper/deleted/.del-realmen.txt~81c30565a8f06539:
Delete: Docs/Books/realmen.txt
BitKeeper/deleted/.del-sql-99.eps~f85c06de7a016c7d:
Delete: Docs/Books/sql-99.eps
BitKeeper/deleted/.del-sql-99.gif~df369376884a5689:
Delete: Docs/Books/sql-99.gif
BitKeeper/deleted/.del-sql-99.txt~eff316adac3dd5b8:
Delete: Docs/Books/sql-99.txt
BitKeeper/deleted/.del-Tutorial-MySQL-final.txt~6e5b88fe4217504d:
Delete: Docs/Tutorial-MySQL-final.txt
BitKeeper/deleted/.del-mysql-01.gif~6f3f2e474b834ac6:
Delete: Docs/MySQL-logos/mysql-01.gif
BitKeeper/deleted/.del-mysql-02.gif~5e03e2ffa6bd060f:
Delete: Docs/MySQL-logos/mysql-02.gif
BitKeeper/deleted/.del-mysql-03.gif~a510e3599346cd5f:
Delete: Docs/MySQL-logos/mysql-03.gif
BitKeeper/deleted/.del-mysql-04.gif~6c3fdc91da64574:
Delete: Docs/MySQL-logos/mysql-04.gif
BitKeeper/deleted/.del-mysql-05.gif~230c28315136655:
Delete: Docs/MySQL-logos/mysql-05.gif
BitKeeper/deleted/.del-mysql-06.gif~8bb16461fd45634e:
Delete: Docs/MySQL-logos/mysql-06.gif
BitKeeper/deleted/.del-mysql-07.gif~b86f918998a2114e:
Delete: Docs/MySQL-logos/mysql-07.gif
BitKeeper/deleted/.del-mysql-08.gif~50fb4d886f82e8bc:
Delete: Docs/MySQL-logos/mysql-08.gif
BitKeeper/deleted/.del-mysql-09.gif~17604ce9d92cd94a:
Delete: Docs/MySQL-logos/mysql-09.gif
BitKeeper/deleted/.del-mysql-10.gif~a8b5306c4d911f8e:
Delete: Docs/MySQL-logos/mysql-10.gif
BitKeeper/deleted/.del-mysql-11.gif~8495404458978524:
Delete: Docs/MySQL-logos/mysql-11.gif
BitKeeper/deleted/.del-mysql-12.gif~18d47c1ad5aef481:
Delete: Docs/MySQL-logos/mysql-12.gif
BitKeeper/deleted/.del-mysql-13.gif~1ad2eedf58da3aaa:
Delete: Docs/MySQL-logos/mysql-13.gif
BitKeeper/deleted/.del-mysql-14.gif~a11e7df8653ad1b1:
Delete: Docs/MySQL-logos/mysql-14.gif
BitKeeper/deleted/.del-mysql-15.gif~64c998fdd6fc1ae1:
Delete: Docs/MySQL-logos/mysql-15.gif
BitKeeper/deleted/.del-mysql-16.gif~6a6c86de2f85f0f5:
Delete: Docs/MySQL-logos/mysql-16.gif
BitKeeper/deleted/.del-mysql-17.gif~b07962578d0952b1:
Delete: Docs/MySQL-logos/mysql-17.gif
BitKeeper/deleted/.del-mysql_anim-01.gif~d27d4f0c1a2a6da9:
Delete: Docs/MySQL-logos/mysql_anim-01.gif
BitKeeper/deleted/.del-mysql_anim-02.gif~476224d724007343:
Delete: Docs/MySQL-logos/mysql_anim-02.gif
BitKeeper/deleted/.del-mysql_anim-03.gif~470dd9c9a8bd55fc:
Delete: Docs/MySQL-logos/mysql_anim-03.gif
BitKeeper/deleted/.del-mysql_anim-04.gif~14f429c87c0c718:
Delete: Docs/MySQL-logos/mysql_anim-04.gif
BitKeeper/deleted/.del-mysql_anim-05.gif~e63e7f003b77ad95:
Delete: Docs/MySQL-logos/mysql_anim-05.gif
BitKeeper/deleted/.del-mysql_anim-06.gif~d9cffaf35d9d4719:
Delete: Docs/MySQL-logos/mysql_anim-06.gif
BitKeeper/deleted/.del-mysql-compatible.jpg~56ecc684688a7382:
Delete: Docs/MySQL-logos/mysql-compatible.jpg
BitKeeper/deleted/.del-docbook-fixup.pl~46cf3bdef147084e:
Delete: Docs/Support/docbook-fixup.pl
BitKeeper/deleted/.del-docbook-prefix.pl~876c7d33c68c224a:
Delete: Docs/Support/docbook-prefix.pl
BitKeeper/deleted/.del-docbook-split~be931c3922898d0:
Delete: Docs/Support/docbook-split
BitKeeper/deleted/.del-make-docbook~ccac1eb717e92ac9:
Delete: Docs/Support/make-docbook
BitKeeper/deleted/.del-make-makefile~39fd454b487126e8:
Delete: Docs/Support/make-makefile
BitKeeper/deleted/.del-test-make-manual~5da458f958a424ec:
Delete: Docs/Support/test-make-manual
BitKeeper/deleted/.del-test-make-manual-de~33cad2886311b8a:
Delete: Docs/Support/test-make-manual-de
BitKeeper/deleted/.del-trivial-makeinfo-4.0c.patch~40d336454ecf98db:
Delete: Docs/Support/trivial-makeinfo-4.0c.patch
BitKeeper/deleted/.del-xwf~76b97805d9146b80:
Delete: Docs/Support/xwf
BitKeeper/deleted/.del-colspec-fix.pl~6c78d3332330b19e:
Delete: Docs/Support/colspec-fix.pl
Docs/generate-text-files.pl:
Rename: Docs/Support/generate-text-files.pl -> Docs/generate-text-files.pl
BitKeeper/deleted/.del-.cvsignore~250f630140b90042:
Delete: Docs/Support/.cvsignore
BitKeeper/deleted/.del-changelog-4.0.xml~8f56ee8a913e848b:
Delete: Docs/changelog-4.0.xml
BitKeeper/deleted/.del-changelog-4.1.xml~8aa496ebed09d868:
Delete: Docs/changelog-4.1.xml
BitKeeper/deleted/.del-changelog-5.0.xml~f4c50926ccdd7434:
Delete: Docs/changelog-5.0.xml
BitKeeper/deleted/.del-sp-implemented.txt~15f5c0033d848288:
Delete: Docs/sp-implemented.txt
mysql-test/std_data/cacert.pem:
Rename: SSL/cacert.pem -> mysql-test/std_data/cacert.pem
mysql-test/std_data/client-cert.pem:
Rename: SSL/client-cert.pem -> mysql-test/std_data/client-cert.pem
mysql-test/std_data/client-key.pem:
Rename: SSL/client-key.pem -> mysql-test/std_data/client-key.pem
mysql-test/std_data/server-cert.pem:
Rename: SSL/server-cert.pem -> mysql-test/std_data/server-cert.pem
mysql-test/std_data/server-key.pem:
Rename: SSL/server-key.pem -> mysql-test/std_data/server-key.pem
BitKeeper/etc/ignore:
added client/mysql_upgrade
Docs/Makefile.am:
Move generate-text-files.pl up a level, since it is the only Support file
Makefile.am:
Remove tools and SSL directories
client/Makefile.am:
Remove mysqltestmanager clients
configure.in:
Remove old tools directory
mysql-test/Makefile.am:
Don't need to copy .pem files any more, they're now in std_data.
scripts/make_binary_distribution.sh:
Don't package up mysqltestmanager
support-files/mysql.spec.sh:
Don't package mysqltestmanager
Diffstat (limited to 'SSL/NOTES')
-rw-r--r-- | SSL/NOTES | 376 |
1 files changed, 0 insertions, 376 deletions
diff --git a/SSL/NOTES b/SSL/NOTES deleted file mode 100644 index 413c724c583..00000000000 --- a/SSL/NOTES +++ /dev/null @@ -1,376 +0,0 @@ -Quick notes: --------------------------------------------- -[tonu@x153 mysql-4.0]$ cat /etc/my.cnf -[mysqld] -ssl-ca=SSL/cacert.pem -ssl-cert=SSL/server-cert.pem -ssl-key=SSL/server-key.pem - -[mysql] -ssl-ca=SSL/cacert.pem -ssl-cert=SSL/client-cert.pem -ssl-key=SSL/client-key.pem - -[mysqldump] -ssl-ca=SSL/cacert.pem -ssl-cert=SSL/client-cert.pem -ssl-key=SSL/client-key.pem - -[tonu@x153 mysql-4.0]$ --------------------------------------------- -To remove passwords from keyfiles: -[tonu@x153 SSL]$ openssl rsa -inform pem < server-req.pem > server-key.pem -read RSA key -Enter PEM pass phrase: -writing RSA key -[tonu@x153 SSL]$ --------------------------------------------- -To run server: - -sql/mysqld --ssl-ca=SSL/cacert.pem --ssl-cert=SSL/server-cert.pem --ssl-key=SSL/server-key.pem --skip-grant --debug='d:t:O,-' > /tmp/mysqld.trace --------------------------------------------- -To run client: - -client/mysql --ssl-ca=SSL/cacert.pem --ssl-cert=SSL/server-cert.pem --ssl-key=SSL/server-key.pem --debug='d:t:O,/tmp/client.trace' -h 127.0.0.1 --------------------------------------------- -openssl s_client -host 127.0.0.1 -port 1111 -debug -verify 1 -cert ../SSL/client-cert.pem -key ../SSL/client-key.pem -CAfile ../SSL/cacert.pem -pause -showcerts -state - --------------------------------------------- -openssl s_server -port 1111 -cert ../SSL/server-cert.pem -key ../SSL/server-key.pem - - - - --------------------------------------------- - -CA stuff: - -[tonu@x153 bin]$ pwd -/usr/local/ssl/bin -[tonu@x153 bin]$ -[tonu@x153 bin]$ ./CA.sh -[tonu@x153 bin]$ ./CA.sh -h -usage: CA -newcert|-newreq|-newca|-sign|-verify -[tonu@x153 bin]$ -[root@x153 bin]# ./CA.sh -newca -CA certificate filename (or enter to create) - -Making CA certificate ... -Using configuration from /usr/lib/ssl/openssl.cnf -Generating a 1024 bit RSA private key -.++++++ -................++++++ -writing new private key to './demoCA/private/./cakey.pem' -Enter PEM pass phrase: -Verifying password - Enter PEM pass phrase: -phrase is too short, needs to be at least 4 chars -Enter PEM pass phrase: -Verifying password - Enter PEM pass phrase: ------ -You are about to be asked to enter information that will be incorporated -into your certificate request. -What you are about to enter is what is called a Distinguished Name or a DN. -There are quite a few fields but you can leave some blank -For some fields there will be a default value, -If you enter '.', the field will be left blank. ------ -ountry Name (2 letter code) [AU]:FI -State or Province Name (full name) [Some-State]: -Locality Name (eg, city) []:Helsinki -Organization Name (eg, company) [Internet Widgits Pty Ltd]:MySQL Finland AB -Organizational Unit Name (eg, section) []: -Common Name (eg, YOUR name) []:Tonu Samuel -Email Address []:tonu@mysql.com -[root@x153 bin]# -[root@x153 bin]# ls -la demoCA/ -total 13 -drwxr-xr-x 6 root root 232 Jun 24 18:50 ./ -drwxr-xr-x 3 root root 2136 Jun 24 18:41 ../ --rw-r--r-- 1 root root 1241 Jun 24 18:50 cacert.pem -drwxr-xr-x 2 root root 48 Jun 24 18:41 certs/ -drwxr-xr-x 2 root root 48 Jun 24 18:41 crl/ --rw-r--r-- 1 root root 0 Jun 24 18:44 index.txt -drwxr-xr-x 2 root root 48 Jun 24 18:41 newcerts/ -drwxr-xr-x 2 root root 80 Jun 24 18:44 private/ --rw-r--r-- 1 root root 3 Jun 24 18:44 serial -[root@x153 bin]# -[root@x153 bin]# ls -la demoCA/private/ -total 5 -drwxr-xr-x 2 root root 80 Jun 24 18:44 ./ -drwxr-xr-x 6 root root 232 Jun 24 18:50 ../ --rw-r--r-- 1 root root 963 Jun 24 18:50 cakey.pem -[root@x153 bin]# -[root@x153 bin]# ./CA.sh -newreq -Using configuration from /usr/lib/ssl/openssl.cnf -Generating a 1024 bit RSA private key -..................++++++ -........................++++++ -writing new private key to 'newreq.pem' -Enter PEM pass phrase: <- new key password, not CA -Verifying password - Enter PEM pass phrase: ------ -You are about to be asked to enter information that will be incorporated -into your certificate request. -What you are about to enter is what is called a Distinguished Name or a DN. -There are quite a few fields but you can leave some blank -For some fields there will be a default value, -If you enter '.', the field will be left blank. ------ -Country Name (2 letter code) [AU]:EE -State or Province Name (full name) [Some-State]: -Locality Name (eg, city) []:Tallinn -Organization Name (eg, company) [Internet Widgits Pty Ltd]:Noname -Organizational Unit Name (eg, section) []: -Common Name (eg, YOUR name) []:Mr Noname -Email Address []:a@b.c - -Please enter the following 'extra' attributes -to be sent with your certificate request -A challenge password []: -An optional company name []: -Request (and private key) is in newreq.pem -[root@x153 bin]# -[root@x153 bin]# ls -la newreq.pem --rw-r--r-- 1 root root 1623 Jun 24 18:54 newreq.pem -[root@x153 bin]# -[root@x153 bin]# ./CA.sh -sign -Using configuration from /usr/lib/ssl/openssl.cnf -Enter PEM pass phrase: <- CA's one! -Check that the request matches the signature -Signature ok -The Subjects Distinguished Name is as follows -countryName :PRINTABLE:'EE' -stateOrProvinceName :PRINTABLE:'Some-State' -localityName :PRINTABLE:'Tallinn' -organizationName :PRINTABLE:'Noname' -commonName :PRINTABLE:'Mr Noname' -emailAddress :IA5STRING:'a@b.c' -Certificate is to be certified until Jun 24 15:50:23 2002 GMT (365 days) -Sign the certificate? [y/n]:y - - -1 out of 1 certificate requests certified, commit? [y/n]y -Write out database with 1 new entries -Data Base Updated -Certificate: - Data: - Version: 3 (0x2) - Serial Number: 1 (0x1) - Signature Algorithm: md5WithRSAEncryption - Issuer: C=FI, ST=Some-State, L=Helsinki, O=MySQL Finland AB, CN=Tonu Samuel/Email=tonu@mysql.com - Validity - Not Before: Jun 24 15:50:23 2001 GMT - Not After : Jun 24 15:50:23 2002 GMT - Subject: C=EE, ST=Some-State, L=Tallinn, O=Noname, CN=Mr Noname/Email=a@b.c - Subject Public Key Info: - Public Key Algorithm: rsaEncryption - RSA Public Key: (1024 bit) - Modulus (1024 bit): - 00:ab:3b:7d:5b:6c:93:f6:46:1a:2c:46:73:6f:89: - 8a:99:bb:e9:6b:94:0d:74:aa:aa:c4:5c:a2:61:cf: - 56:bb:a1:a9:5a:37:c4:4e:b2:ec:5c:18:3a:a4:8d: - af:3d:23:66:7c:85:7f:d1:f2:e3:fc:16:a7:4c:a2: - d6:45:06:92:75:d8:a2:3b:f9:aa:77:da:26:b9:87: - e0:df:50:54:e4:36:9f:35:87:39:8e:a6:7c:3e:a8: - e4:49:1a:76:c2:6f:73:0b:22:93:2a:04:67:0d:7d: - ae:34:5c:fe:7c:29:b8:a2:fe:1e:ef:d1:0c:4d:dd: - 5b:7a:67:b0:0a:22:88:a0:af - Exponent: 65537 (0x10001) - X509v3 extensions: - X509v3 Basic Constraints: - CA:FALSE - Netscape Comment: - OpenSSL Generated Certificate - X509v3 Subject Key Identifier: - 83:D1:0D:52:0F:DE:61:2D:A6:10:20:B8:46:0C:77:D5:D2:D0:BE:20 - X509v3 Authority Key Identifier: - keyid:A5:0A:D6:72:B5:DF:E4:C2:2B:7B:07:5E:D3:4D:52:07:E1:83:6B:7F - DirName:/C=FI/ST=Some-State/L=Helsinki/O=MySQL Finland AB/CN=Tonu Samuel/Email=tonu@mysql.com - serial:00 - - Signature Algorithm: md5WithRSAEncryption - 60:85:f7:d0:54:2a:67:88:0e:37:a6:a8:8e:fd:a0:c9:a1:d7: - c6:fc:4c:2e:59:8d:88:6d:69:0a:b8:b2:67:5f:81:94:39:0e: - ab:67:fc:8b:62:de:85:f6:b3:8c:2d:1a:e3:dc:28:fc:f5:99: - 39:f0:3d:50:ca:88:c0:8e:f8:c2:02:5d:34:19:63:9f:c4:a2: - f6:a8:81:c9:8d:6d:bd:c4:42:4a:0c:49:5a:cc:24:ea:65:80: - dd:79:20:89:9e:ea:6b:80:7a:86:f9:bb:6d:24:3c:80:13:5b: - e6:16:fc:3d:8d:f6:16:ea:33:25:c6:90:20:81:a4:b0:15:2e: - 9c:1c ------BEGIN CERTIFICATE----- -MIIDfjCCAuegAwIBAgIBATANBgkqhkiG9w0BAQQFADCBhTELMAkGA1UEBhMCRkkx -EzARBgNVBAgTClNvbWUtU3RhdGUxETAPBgNVBAcTCEhlbHNpbmtpMRkwFwYDVQQK -ExBNeVNRTCBGaW5sYW5kIEFCMRQwEgYDVQQDEwtUb251IFNhbXVlbDEdMBsGCSqG -SIb3DQEJARYOdG9udUBteXNxbC5jb20wHhcNMDEwNjI0MTU1MDIzWhcNMDIwNjI0 -MTU1MDIzWjBvMQswCQYDVQQGEwJFRTETMBEGA1UECBMKU29tZS1TdGF0ZTEQMA4G -A1UEBxMHVGFsbGlubjEPMA0GA1UEChMGTm9uYW1lMRIwEAYDVQQDEwlNciBOb25h -bWUxFDASBgkqhkiG9w0BCQEWBWFAYi5jMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCB -iQKBgQCrO31bbJP2RhosRnNviYqZu+lrlA10qqrEXKJhz1a7oalaN8ROsuxcGDqk -ja89I2Z8hX/R8uP8FqdMotZFBpJ12KI7+ap32ia5h+DfUFTkNp81hzmOpnw+qORJ -GnbCb3MLIpMqBGcNfa40XP58Kbii/h7v0QxN3Vt6Z7AKIoigrwIDAQABo4IBETCC -AQ0wCQYDVR0TBAIwADAsBglghkgBhvhCAQ0EHxYdT3BlblNTTCBHZW5lcmF0ZWQg -Q2VydGlmaWNhdGUwHQYDVR0OBBYEFIPRDVIP3mEtphAguEYMd9XS0L4gMIGyBgNV -HSMEgaowgaeAFKUK1nK13+TCK3sHXtNNUgfhg2t/oYGLpIGIMIGFMQswCQYDVQQG -EwJGSTETMBEGA1UECBMKU29tZS1TdGF0ZTERMA8GA1UEBxMISGVsc2lua2kxGTAX -BgNVBAoTEE15U1FMIEZpbmxhbmQgQUIxFDASBgNVBAMTC1RvbnUgU2FtdWVsMR0w -GwYJKoZIhvcNAQkBFg50b251QG15c3FsLmNvbYIBADANBgkqhkiG9w0BAQQFAAOB -gQBghffQVCpniA43pqiO/aDJodfG/EwuWY2IbWkKuLJnX4GUOQ6rZ/yLYt6F9rOM -LRrj3Cj89Zk58D1QyojAjvjCAl00GWOfxKL2qIHJjW29xEJKDElazCTqZYDdeSCJ -nuprgHqG+bttJDyAE1vmFvw9jfYW6jMlxpAggaSwFS6cHA== ------END CERTIFICATE----- -Signed certificate is in newcert.pem -[root@x153 bin]# ls -la demoCA/newcerts/ -total 5 -drwxr-xr-x 2 root root 72 Jun 24 18:58 ./ -drwxr-xr-x 6 root root 296 Jun 24 18:58 ../ --rw-r--r-- 1 root root 3533 Jun 24 18:58 01.pem -[root@x153 bin]# -[root@x153 mysql-4.0]# ./sql/mysqld --ssl-cert=SSL/server-cert.pem --ssl-ca=SSL/cacert.pem --ssl-ke -y=SSL/server-req.pem -L /home/tonu/mysql-4.0/sql/share/english/ -u root -Enter PEM pass phrase: -./sql/mysqld: ready for connections -[tonu@x153 mysql-4.0]$ client/mysql --ssl-key=SSL/client-req.pem --ssl-ca=SSL/cacert.pem --ssl-cert -=SSL/client-cert.pem -Enter PEM pass phrase: -ERROR: - -[tonu@x153 mysql-4.0]$ - - - - --8<------------------------ -SSL encrypts data between MySQL server and client. - -You need openssl (formerly SSLeay) for MySQL SSL support. Development -and testing was done on openssl version 0.9.3a - -To compile MySQL one must do: -./configure --with-openssl=/usr - -or - -./configure --with-openssl=yes - -There are sample keys and certificates included with MySQL tarball in -directory ./SSL. They are meant to be for quick start and -testing only. Using them in production environment means same as not -using encryption. This is because private keys are publicly -accessible for everyone. You must use openssl distribution for new key -and certificate generation for both client and server. - ------------ for manual: --------------------- -*New API calls:* - -mysql_ssl_set() - Set SSL properties (key, certificate, -certificates authority certificate). Must be called before -mysql_real_connect(); -mysql_ssl_clear() - Clear and free resources occupied by -mysql_ssl_set() API call. -char *mysql_ssl_cipher(MYSQL *) - returns cipher in use. For example -"DES-CDC3-SHA" means that you have combined triple DES symmetric -algorithm and SHA -hashing algorithm. - - -*New command line switches:* ---ssl Use SSL for connection (automatically set with -other flags. This means one can use encrypted connection without strong -cryptological authentication. Normally one must use all switches -together including ssl-key, ssl-cert and ssl-ca and never mind about ---ssl because this is assumed by defult if any of them (--ssl-...) -included. ---ssl-key X509 key in PEM format (implies --ssl) ---ssl-cert X509 cert in PEM format (implies --ssl) ---ssl-ca CA file in PEM format (check OpenSSL docs, -implies --ssl) ---ssl-capath CA directory (check OpenSSL docs, implies --ssl - ---------------- - This is about using SSL in MySQL privilege system. My idea is to make - possible use of x509 certificates and keys instead of MySQL native - passwords -Some basic theory about crypt, SSL and x509: -x509 is standard for certificates. SSL is standard for secure -communication. Certificates are issued by someone anyone can trust. This -trusted party is called "Certificate Authority" or "CA". This is -someone, we MUST trust. Everyone must have some "fingerprint" of CA (so -called "CA certificate" or "CA cert") using which one can verify -authenticity of other -certificates issued by this CA. CA uses his power to give certificates -to persons (they can be physical (like "monty") or logical (like some -process). Person is identified by "subject" like -"/C=EE/ST=Harjumaa/L=Tallinn/O=MySQL client bogus certificate/CN=Tonu -Samuel/Email=<EMAIL: PROTECTED>". and signed cryptologically. This sign can be -verified using CA-cert. So, if we trust CA, then we can trust identity -of user. -There can be many CA-s (usually not but who knows). Also there can be -some users we don`t trust or have different privileges. This means we -must have one table to hold CA-certs and other table to hold so called -"subjects" (users). I think it`s a good idea to use existing structure -of host/user/db/field and add some x509 relationship. Then we can -use usual simple user/host pair or x509 subject/CA pair. -So I think user must grant rights using old method GRANT blabla ON -blabla TO blabla IDENTIFIED BY blabla -or new way: ------------8<--------------------------- -GRANT blabla ON blabla TO blabla -IDENTIFIED BY X509 SUBJECT "/C=EE/ST=Harjumaa/L=Tallinn/O=MySQL client -bogus certificate/CN=Tonu Samuel/Email=<EMAIL: PROTECTED>" AND ISSUER -"/C=EE/ST=Harjumaa/L=Tallinn/O=TCX AB/CN=Tonu -Samuel/Email=<EMAIL: PROTECTED>"; ------------8<--------------------------- -Please note the difference in Subject and Issuer. This command requests -user to authenticate itself with exact subject and exact certificate -issuer. Next possibility is just have any certificate of some good CA: ------------8<--------------------------- -GRANT blabla ON blabla TO blabla IDENTIFIED BY X509 ISSUER -"/C=EE/ST=Harjumaa/L=Tallinn/O=TCX -AB/CN=Tonu Samuel/Email=<EMAIL: PROTECTED>"; ------------8<--------------------------- -or if any registered CA is good enough (usual case when only one CA is -registered) -but we care about exact user, then something like: ------------8<--------------------------- -GRANT blabla ON blabla TO blabla IDENTIFIED BY X509 SUBJECT -"/C=EE/ST=Harjumaa/L=Tallinn/O=MySQL client -bogus certificate/CN=Tonu Samuel/Email=<EMAIL: PROTECTED>"; ------------8<--------------------------- -And case if user must authenticate itself but we don`t care about exact -person until he have some certificate issued by CA registered in our -system: ------------8<--------------------------- -GRANT blabla ON blabla TO blabla IDENTIFIED BY X509; ------------8<--------------------------- -Then additionally we need one exception. Let`s assume we need SSL -encryption -for preventing eavesdropping but we don`t care who it is at all. We need -privilege to exclude all non-SSL users but we accept anyone using SSL. -How -this must be done in GRANT syntax? Maybe: ------------8<--------------------------- -GRANT blabla ON blabla TO blabla -IDENTIFIED BY blabla AND USING SSL ------------8<--------------------------- -But maybe we want to add in future possibility to check different -algorithms and key lengths? Something like: ------------8<--------------------------- -GRANT blabla ON blabla TO blabla IDENTIFIED BY blabla AND USING SSL WITH -CIPHER "DES-CBC3-SHA" OR "DES-CBC3-MD5" ------------8<--------------------------- -Also we need some command to include/exclude CA certificates. This must -be some commands like INSERT/DELETE/UPDATE/REPLACE to do it. -All examples is given for clarify my problem. I asking for help because -I don`t know -any similar command in other SQL-s. -------------8<------------------------ - -So, at moment SSL communications is ready and working. I don`t have this -command iterface at moment yet and this can be changed a lot if someone -can suggest good idea or reason to change them. We are ready to listen -every opinion. -About Kerberos: I just don`t know much about it. I have to read this -again before I can comment. I never used it itself and forgot most of -theory. Sorry. Anyway now the problem/need is known and I will put -thinking about this in personal TODO. - - |