<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>
	Comments on: MySQL Encryption In-Transit Does NOT Require Client-Side Certificates	</title>
	<atom:link href="https://www.brandonchecketts.com/archives/mysql-encryption-in-transit-does-not-require-client-side-certificates/feed" rel="self" type="application/rss+xml" />
	<link>https://www.brandonchecketts.com/archives/mysql-encryption-in-transit-does-not-require-client-side-certificates</link>
	<description>Web Programming, Linux System Administation, and Entrepreneurship in Athens Georgia</description>
	<lastBuildDate>Sat, 02 Sep 2023 16:41:02 +0000</lastBuildDate>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>
		By: Brandon		</title>
		<link>https://www.brandonchecketts.com/archives/mysql-encryption-in-transit-does-not-require-client-side-certificates/comment-page-1#comment-196380</link>

		<dc:creator><![CDATA[Brandon]]></dc:creator>
		<pubDate>Wed, 02 Nov 2022 13:48:26 +0000</pubDate>
		<guid isPermaLink="false">https://www.brandonchecketts.com/?p=913#comment-196380</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;https://www.brandonchecketts.com/archives/mysql-encryption-in-transit-does-not-require-client-side-certificates/comment-page-1#comment-196360&quot;&gt;Steven Chu&lt;/a&gt;.

Great question Steven. I just wrote an article explaining how Certificate Authorities are able to verify that a remote server is who they claim to be at https://www.brandonchecketts.com/archives/how-do-clients-securely-connect-to-ssl-https-servers

That is more focused on HTTPS, since that is what people will be more familiar with, but the exact same steps are used for MySQL since it uses the same SSL libraries and root certificates on your system.  As long as the remote system has a certificate that is signed by a trusted Certificate Authority, you don&#039;t need to provide the server certificate to the client in advance.]]></description>
			<content:encoded><![CDATA[<p>In reply to <a href="https://www.brandonchecketts.com/archives/mysql-encryption-in-transit-does-not-require-client-side-certificates/comment-page-1#comment-196360">Steven Chu</a>.</p>
<p>Great question Steven. I just wrote an article explaining how Certificate Authorities are able to verify that a remote server is who they claim to be at <a href="https://www.brandonchecketts.com/archives/how-do-clients-securely-connect-to-ssl-https-servers" rel="ugc">https://www.brandonchecketts.com/archives/how-do-clients-securely-connect-to-ssl-https-servers</a></p>
<p>That is more focused on HTTPS, since that is what people will be more familiar with, but the exact same steps are used for MySQL since it uses the same SSL libraries and root certificates on your system.  As long as the remote system has a certificate that is signed by a trusted Certificate Authority, you don&#8217;t need to provide the server certificate to the client in advance.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Steven Chu		</title>
		<link>https://www.brandonchecketts.com/archives/mysql-encryption-in-transit-does-not-require-client-side-certificates/comment-page-1#comment-196360</link>

		<dc:creator><![CDATA[Steven Chu]]></dc:creator>
		<pubDate>Wed, 02 Nov 2022 04:30:18 +0000</pubDate>
		<guid isPermaLink="false">https://www.brandonchecketts.com/?p=913#comment-196360</guid>

					<description><![CDATA[Hello! I apologize for the random comment but I&#039;m banging my head trying to understand how I can have an encrypted connection without certificates?!! Stackoverflow has a nice answer here: https://dba.stackexchange.com/questions/205219/why-am-i-connecting-securely-to-mysql-when-i-dont-have-client-certificates

But the part that I still don&#039;t get is: 
&#062; If the certificate you used when setting up SSL is valid, and is trusted by the client attempting to establish a connection, then the connection attempt should succeed. The client does not need to present a certificate here, but it does need to trust the issuer of the certificate

Specifically the following sentence doesn&#039;t make sense to me:
&#062; This is generally done by having a copy of the CA certificate on your machine and verifying that the certificate presented by the server is signed/issued by the CA.This corresponds roughly to the --ssl-mode=VERIFY_CA and --ssl-mode=VERIFY_IDENTITY (which checks that the host name in the certificate matches the server you are trying to connect to).

How could my client trust the issuer of the certificate if, on my client machine, there is no copy of the CA certificate? In my /etc/my.cnf and ~/.my.cnf files there is nothing to do with `ssl-*` anything! My understanding of encryption is that both the client and the server need somehow access to the same key of sorts -- this (https://security.stackexchange.com/questions/73244/can-we-have-https-without-certificates) answer seems to mention something about DH_anon but I don&#039;t quite get whether that has anything to do with anything :P . But I&#039;m confused since in this case my server may have some files that I&#039;ve generated with openssl but my client has none of those files!]]></description>
			<content:encoded><![CDATA[<p>Hello! I apologize for the random comment but I&#8217;m banging my head trying to understand how I can have an encrypted connection without certificates?!! Stackoverflow has a nice answer here: <a href="https://dba.stackexchange.com/questions/205219/why-am-i-connecting-securely-to-mysql-when-i-dont-have-client-certificates" rel="nofollow ugc">https://dba.stackexchange.com/questions/205219/why-am-i-connecting-securely-to-mysql-when-i-dont-have-client-certificates</a></p>
<p>But the part that I still don&#8217;t get is:<br />
&gt; If the certificate you used when setting up SSL is valid, and is trusted by the client attempting to establish a connection, then the connection attempt should succeed. The client does not need to present a certificate here, but it does need to trust the issuer of the certificate</p>
<p>Specifically the following sentence doesn&#8217;t make sense to me:<br />
&gt; This is generally done by having a copy of the CA certificate on your machine and verifying that the certificate presented by the server is signed/issued by the CA.This corresponds roughly to the &#8211;ssl-mode=VERIFY_CA and &#8211;ssl-mode=VERIFY_IDENTITY (which checks that the host name in the certificate matches the server you are trying to connect to).</p>
<p>How could my client trust the issuer of the certificate if, on my client machine, there is no copy of the CA certificate? In my /etc/my.cnf and ~/.my.cnf files there is nothing to do with `ssl-*` anything! My understanding of encryption is that both the client and the server need somehow access to the same key of sorts &#8212; this (<a href="https://security.stackexchange.com/questions/73244/can-we-have-https-without-certificates" rel="nofollow ugc">https://security.stackexchange.com/questions/73244/can-we-have-https-without-certificates</a>) answer seems to mention something about DH_anon but I don&#8217;t quite get whether that has anything to do with anything 😛 . But I&#8217;m confused since in this case my server may have some files that I&#8217;ve generated with openssl but my client has none of those files!</p>
]]></content:encoded>
		
			</item>
	</channel>
</rss>
