-
Notifications
You must be signed in to change notification settings - Fork 338
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
TLS support for database protocols #515
Comments
@sunng87 Should TLS acceptor be added in following location?
|
Yes, at least we need some configuration to enable TLS. For postgres, using pgwire, TLS is already supported via this option, which is set to For MySQL, I haven't got time investigate its library support for TLS, we probably need to work with upstream and upstream of upstream for the support. When all protocol level supported finished, we need to add last-mile configuration to manage and load cert/key files. |
For MySQL, looks like there is one issue about this. |
I made a PR to opensrv-mysql to support MySQL TLS databendlabs/opensrv#34 |
Both mysql and postgresql shares same port of plain-text connection and secure one. Unlike http or grpc transports, database protocols have their own tls handshake process. So we might not be able to utilize haproxy or cloud load balancer for tls termination. Tls support has to be implemented in database side. Task including:
We can provide options to restrict insecure connection access in future
The text was updated successfully, but these errors were encountered: