Skip to content

Commit 2ddcc28

Browse files
Merge pull request #214774 from GennadNY/gennadyk076
Update concepts-certificate-rotation.md
2 parents 014f5bb + e3ef129 commit 2ddcc28

File tree

1 file changed

+8
-4
lines changed

1 file changed

+8
-4
lines changed

articles/postgresql/single-server/concepts-certificate-rotation.md

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -24,15 +24,19 @@ As per the industry's compliance requirements, CA vendors began revoking CA cert
2424

2525
The new certificate is rolled out and in effect starting October, 2022 (10/2022).
2626

27-
## What change will be performed starting October 2022 (10/2022)?
27+
## What change will be performed starting November 2022 (11/2022)?
2828

29-
Starting October 2022, the [BaltimoreCyberTrustRoot root certificate](https://www.digicert.com/CACerts/BaltimoreCyberTrustRoot.crt.pem) will be replaced with a **compliant version** known as [DigiCertGlobalRootG2 root certificate ](https://www.digicert.com/CACerts/BaltimoreCyberTrustRoot.crt.pem). If your applications take advantage of **verify-ca** or **verify-full** as value of [**sslmode** parameter](https://www.postgresql.org/docs/current/libpq-ssl.html) in the database client connectivity will need to follow directions below to add new certificates to certificate store to maintain connectivity.
29+
Starting November 2022, the [BaltimoreCyberTrustRoot root certificate](https://www.digicert.com/CACerts/BaltimoreCyberTrustRoot.crt.pem) will be replaced with a **compliant version** known as [DigiCertGlobalRootG2 root certificate ](https://www.digicert.com/CACerts/BaltimoreCyberTrustRoot.crt.pem). If your applications take advantage of **verify-ca** or **verify-full** as value of [**sslmode** parameter](https://www.postgresql.org/docs/current/libpq-ssl.html) in the database client connectivity will need to follow directions below to add new certificates to certificate store to maintain connectivity.
3030

3131
## Do I need to make any changes on my client to maintain connectivity?
3232

33-
There are no code or application changes required on client side. if you follow our previous recommendation below, you will still be able to continue to connect as long as **BaltimoreCyberTrustRoot certificate isn't removed** from the combined CA certificate. **We recommend to not remove the BaltimoreCyberTrustRoot from your combined CA certificate until further notice to maintain connectivity.**
33+
There are no code or application changes required on client side. if you follow our certificate update recommendation below, you will still be able to continue to connect as long as **BaltimoreCyberTrustRoot certificate isn't removed** from the combined CA certificate. **We recommend to not remove the BaltimoreCyberTrustRoot from your combined CA certificate until further notice to maintain connectivity.**
3434

35-
### Previous Recommendation
35+
## Do I need to make any changes to client certificates
36+
37+
By default, PostgreSQL will not perform any verification of the server certificate. This means that it is still theoretically possible to spoof the server identity (for example by modifying a DNS record or by taking over the server IP address) without the client knowing. In order to prevent any possibility spoofing, SSL certificate verification on the client must be used. Such verification can be set via application client connection string [**ssl mode**](https://www.postgresql.org/docs/13/libpq-ssl.html) value - **verify-ca** or **verify-full**. If these ssl-mode values are chosen you should follow directions in next section.
38+
39+
### Client Certificate Update Recommendation
3640

3741
* Download BaltimoreCyberTrustRoot & DigiCertGlobalRootG2 Root CA from links below:
3842
* https://www.digicert.com/CACerts/BaltimoreCyberTrustRoot.crt.pem

0 commit comments

Comments
 (0)