Rechercher dans le manuel MySQL
6.3.1 Configuring MySQL to Use Encrypted Connections
Several options are available to indicate whether to use encrypted connections, and to specify the appropriate certificate and key files. This section provides general guidance about configuring the server and clients for encrypted connections:
For a complete list of options related to establishment of encrypted connections, see Command Options for Encrypted Connections. Instructions for creating any required certificate and key files are available in Section 6.3.3, “Creating SSL and RSA Certificates and Keys”.
Encrypted connections also can be used in these contexts:
Between master and slave replication servers. See Section 17.3.9, “Setting Up Replication to Use Encrypted Connections”.
Among Group Replication servers. See Section 18.5.2, “Group Replication Secure Socket Layer (SSL) Support”.
By client programs that are based on the MySQL C API. See Section 28.7.22, “C API Encrypted Connection Support”.
Server-Side Startup Configuration for Encrypted Connections
On the server side, the --ssl
option specifies that the server permits but does not require
encrypted connections. This option is enabled by default, so it
need not be specified explicitly.
To require that clients connect using encrypted connections,
enable the
require_secure_transport
system
variable. See Configuring Encrypted Connections as Mandatory.
These options on the server side specify the certificate and key files the server uses when permitting clients to establish encrypted connections:
--ssl-ca
: The path name of the Certificate Authority (CA) certificate file. (--ssl-capath
is similar but specifies the path name of a directory of CA certificate files.)--ssl-cert
: The path name of the server public key certificate file. This certificate can be sent to the client and authenticated against the CA certificate that it has.--ssl-key
: The path name of the server private key file.
For example, to enable the server for encrypted connections,
start it with these lines in the my.cnf
file, changing the file names as necessary:
[mysqld]
ssl-ca=ca.pem
ssl-cert=server-cert.pem
ssl-key=server-key.pem
To specify in addition that clients are required to use
encrypted connections, enable the
require_secure_transport
system
variable:
[mysqld]
ssl-ca=ca.pem
ssl-cert=server-cert.pem
ssl-key=server-key.pem
require_secure_transport=ON
Each certificate and key option names a file in PEM format.
Should you need to create the required certificate and key
files, see Section 6.3.3, “Creating SSL and RSA Certificates and Keys”. MySQL
servers compiled using OpenSSL can generate missing certificate
and key files automatically at startup. See
Section 6.3.3.1, “Creating SSL and RSA Certificates and Keys using MySQL”.
Alternatively, if you have a MySQL source distribution, you can
test your setup using the demonstration certificate and key
files in its mysql-test/std_data
directory.
The server performs certificate and key file autodiscovery. If
--ssl
is enabled (possibly along
with --ssl-cipher
) and other
--ssl-
options
are not given to configure encrypted
connections explicitly, the server attempts to enable encrypted
connection support automatically at startup:
xxx
If the server discovers valid certificate and key files named
ca.pem
,server-cert.pem
, andserver-key.pem
in the data directory, it enables support for encrypted connections by clients. (The files need not have been generated automatically; what matters is that they have those names and are valid.)If the server does not find valid certificate and key files in the data directory, it continues executing but without support for encrypted connections.
If the server automatically enables encrypted connection support, it writes a note to the error log. If the server discovers that the CA certificate is self-signed, it writes a warning to the error log. (The certificate is self-signed if created automatically by the server or manually using mysql_ssl_rsa_setup.)
MySQL also provides these options for server-side SSL control:
--ssl-cipher
: The list of permissible ciphers for connection encryption.--ssl-crl
: The path name of the file containing certificate revocation lists. (--ssl-crlpath
is similar but specifies the path name of a directory of certificate revocation-list files.)
The values of the
--ssl-
options
set the values of the corresponding system variables
(xxx
ssl_ca
,
ssl_cert
,
ssl_key
, and so forth).
To explicitly specify which encryption protocols and
ciphersuites the server permits for encrypted connections, use
the tls_version
and
tls_ciphersuites
system
variables; see
Section 6.3.2, “Encrypted Connection Protocols and Ciphers”. For
example, you can set
tls_version
to prevent clients
from using less-secure protocols.
Certain encryption-related system variables can be set at
runtime:
require_secure_transport
, and
(as of MySQL 8.0.16)
tls_version
and
tls_ciphersuites
. If changed
with SET
GLOBAL
, the new values apply to connections
established subsequent to the change, and apply only until
server restart. If changed with
SET
PERSIST
, the new values also apply to subsequent
server restarts. See Section 13.7.5.1, “SET Syntax for Variable Assignment”.
In addition, as of MySQL 8.0.16, the SSL context the server uses for new connections is reconfigurable at runtime. This capability may be useful, for example, to avoid restarting a MySQL server that has been running so long that its SSL certificate has expired.
The server creates the initial SSL context from the values that the context-related system variables have at startup. It also initializes a set of context-related status variables to indicate the values used in the context. The following table shows the system variables that define the SSL context and the corresponding status variables that indicate the currently active context values.
Table 6.11 Corresponding System and Status Variables Related to Server SSL Context
To reconfigure the SSL context at runtime, use this procedure:
Set any SSL context-related system variables that should be changed to their new values.
Execute
ALTER INSTANCE RELOAD TLS
. This statement reconfigures the active SSL context from the current values of the SSL context-related system variables. It also sets the context-related status variables to reflect the new active context values. The statement requires theCONNECTION_ADMIN
privilege.New connections established after execution of
ALTER INSTANCE RELOAD TLS
use the new SSL context. Existing connections remain unaffected. If existing connections should be terminated, use theKILL
statement.
The members of each pair of system and status variables may have different values temporarily due to the way the reconfiguration procedure works:
Changes to the system variables prior to
ALTER INSTANCE RELOAD TLS
do not change the SSL context. At this point, those changes have no effect on new connections, and corresponding context-related system and status variables may have different values. This enables you to make any changes required to the system variables, then update the active SSL context atomically withALTER INSTANCE RELOAD TLS
after all system variable changes have been made.After
ALTER INSTANCE RELOAD TLS
, corresponding system and status variables have the same values. This remains true until the next change to the system variables.
In some cases, ALTER INSTANCE RELOAD
TLS
by itself may suffice to reconfigure the SSL
context, without changing any system variables. Suppose that the
certificate in the file named by
ssl_cert
has expired. It is
sufficient to replace the existing file contents with a
nonexpired certificate and execute ALTER
INSTANCE RELOAD TLS
to cause the new file contents to
be read and used for new connections.
By default, the RELOAD TLS
action rolls back
with an error and has no effect if the configuration values do
not permit creation of a new SSL context. The previous context
values continue to be used for new connections.
If the optional NO ROLLBACK ON ERROR
clause
is given and a new context cannot be created, rollback does not
occur. Instead, a warning is generated and SSL is disabled for
new connections.
The server-side --ssl
option has
an effect only at server startup on whether the server accepts
SSL connections. It is ignored by, and has no effect on the
operation of, ALTER INSTANCE RELOAD
TLS
. For example, you can use
--ssl=0
to start the server with
SSL connections disabled, then reconfigure SSL and execute
ALTER INSTANCE RELOAD TLS
to
enable SSL connections at runtime.
ALTER INSTANCE RELOAD TLS
changes
only the SSL context the server itself uses for new connections.
It does not affect the SSL context used by other enabled server
plugins or components such as X Plugin or Group
Replication. If you want to apply the reconfiguration to Group
Replication's group communication connections, which take their
settings from the server's SSL context-related system variables,
you must issue STOP
GROUP_REPLICATION
followed by
START GROUP_REPLICATION
to stop
and restart Group Replication.
Prior to MySQL 8.0.16, the SSL context-related system variables are not dynamic. They can be set at server startup, but cannot be changed thereafter. These system variables therefore determine the SSL context values the server uses for all new connections.
By default, MySQL client programs attempt to establish an
encrypted connection if the server supports encrypted
connections, with further control available through the
--ssl-mode
option:
In the absence of an
--ssl-mode
option, clients attempt to connect using encryption, falling back to an unencrypted connection if an encrypted connection cannot be established. This is also the behavior with an explicit--ssl-mode=PREFFERED
option.With
--ssl-mode=REQUIRED
, clients require an encrypted connection and fail if one cannot be established.With
--ssl-mode=DISABLED
, clients use an unencrypted connection.With
--ssl-mode=VERIFY_CA
or--ssl-mode=VERIFY_IDENTITY
, clients require an encrypted connection, and also perform verification against the server CA certificate and (withVERIFY_IDENTITY
) against the server host name in its certificate.
Attempts to establish an unencrypted connection fail if the
require_secure_transport
system
variable is enabled on the server side to cause the server to
require encrypted connections. See
Configuring Encrypted Connections as Mandatory.
The following options on the client side identify the
certificate and key files clients use when establishing
encrypted connections to the server. They are similar to the
options used on the server side, but
--ssl-cert
and
--ssl-key
identify the client
public and private key:
--ssl-ca
: The path name of the Certificate Authority (CA) certificate file. This option, if used, must specify the same certificate used by the server. (--ssl-capath
is similar but specifies the path name of a directory of CA certificate files.)--ssl-cert
: The path name of the client public key certificate file.--ssl-key
: The path name of the client private key file.
For additional security relative to that provided by the default encryption, clients can supply a CA certificate matching the one used by the server and enable host name identity verification. In this way, the server and client place their trust in the same CA certificate and the client verifies that the host to which it connected is the one intended:
To specify the CA certificate, use
--ssl-ca
(or--ssl-capath
), and specify--ssl-mode=VERIFY_CA
.To enable host name identity verification as well, use
--ssl-mode=VERIFY_IDENTITY
rather than--ssl-mode=VERIFY_CA
.
Host name identity verification with
VERIFY_IDENTITY
does not work with
self-signed certificates that are created automatically by the
server or manually using
mysql_ssl_rsa_setup (see
Section 6.3.3.1, “Creating SSL and RSA Certificates and Keys using MySQL”). Such
self-signed certificates do not contain the server name as the
Common Name value.
Host name identity verification also does not work with certificates that specify the Common Name using wildcards because that name is compared verbatim to the server name.
MySQL also provides these options for client-side SSL control:
--ssl-cipher
: The list of permissible ciphers for connection encryption.--ssl-crl
: The path name of the file containing certificate revocation lists. (--ssl-crlpath
is similar but specifies the path name of a directory of certificate revocation-list files.)--tls-version
,--tls-ciphersuites
: The permitted encryption protocols and ciphersuites; see Section 6.3.2, “Encrypted Connection Protocols and Ciphers”.
Depending on the encryption requirements of the MySQL account used by a client, the client may be required to specify certain options to connect using encryption to the MySQL server.
Suppose that you want to connect using an account that has no
special encryption requirements or that was created using a
CREATE USER
statement that
included the REQUIRE SSL
clause. Assuming
that the server supports encrypted connections, a client can
connect using encryption with no
--ssl-mode
option or with an
explicit --ssl-mode=PREFFERED
option:
mysql
Or:
mysql --ssl-mode=PREFERRED
For an account created with a REQUIRE SSL
clause, the connection attempt fails if an encrypted connection
cannot be established. For an account with no special encryption
requirements, the attempt falls back to an unencrypted
connection if an encrypted connection cannot be established. To
prevent fallback and fail if an encrypted connection cannot be
obtained, connect like this:
mysql --ssl-mode=REQUIRED
If the account has more stringent security requirements, other options must be specified to establish an encrypted connection:
For accounts created with a
REQUIRE X509
clause, clients must specify at least--ssl-cert
and--ssl-key
. In addition,--ssl-ca
(or--ssl-capath
) is recommended so that the public certificate provided by the server can be verified. For example:mysql --ssl-ca=ca.pem \ --ssl-cert=client-cert.pem \ --ssl-key=client-key.pem
For accounts created with a
REQUIRE ISSUER
orREQUIRE SUBJECT
clause, the encryption requirements are the same as forREQUIRE X509
, but the certificate must match the issue or subject, respectively, specified in the account definition.
For additional information about the REQUIRE
clause, see Section 13.7.1.3, “CREATE USER Syntax”.
To prevent use of encryption and override other
--ssl-
options,
invoke the client program with
xxx
--ssl-mode=DISABLED
:
mysql --ssl-mode=DISABLED
To determine whether the current connection with the server uses
encryption, check the session value of the
Ssl_cipher
status variable. If
the value is empty, the connection is not encrypted. Otherwise,
the connection is encrypted and the value indicates the
encryption cipher. For example:
- +---------------+---------------------------+
- +---------------+---------------------------+
- | Ssl_cipher | DHE-RSA-AES128-GCM-SHA256 |
- +---------------+---------------------------+
For the mysql client, an alternative is to
use the STATUS
or \s
command and check the SSL
line:
Or:
For some MySQL deployments it may be not only desirable but mandatory to use encrypted connections (for example, to satisfy regulatory requirements). This section discusses configuration settings that enable you to do this. These levels of control are available:
You can configure the server to require the clients connect using encrypted connections.
You can invoke individual client programs to require an encrypted connection, even if the server permits but does not require encryption.
You can configure individual MySQL accounts to be usable only over encrypted connections.
To require that clients connect using encrypted connections,
enable the
require_secure_transport
system
variable. For example, put these lines in the server
my.cnf
file:
[mysqld]
require_secure_transport=ON
Alternatively, to set and persist the value at runtime, use this statement:
SET
PERSIST
sets the value for the running MySQL instance.
It also saves the value, causing it to be used for subsequent
server restarts. See Section 13.7.5.1, “SET Syntax for Variable Assignment”.
With require_secure_transport
enabled, client connections to the server are required to use
some form of secure transport, and the server permits only
TCP/IP connections that use SSL, or connections that use a
socket file (on Unix) or shared memory (on Windows). The server
rejects nonsecure connection attempts, which fail with an
ER_SECURE_TRANSPORT_REQUIRED
error.
To invoke a client program such that it requires an encrypted
connection whether or not the server requires encryption, use an
--ssl-mode
option value of
REQUIRED
, VERIFY_CA
, or
VERIFY_IDENTITY
. For example:
mysql --ssl-mode=REQUIRED
mysqldump --ssl-mode=VERIFY_CA
mysqladmin --ssl-mode=VERIFY_IDENTITY
To configure a MySQL account to be usable only over encrypted
connections, include a REQUIRE
clause in the
CREATE USER
statement that
creates the account, specifying in that clause the encryption
characteristics you require. For example, to require an
encrypted connection and the use of a valid X.509 certificate,
use REQUIRE X509
:
For additional information about the REQUIRE
clause, see Section 13.7.1.3, “CREATE USER Syntax”.
To modify existing accounts that have no encryption
requirements, use the ALTER USER
statement.
Nederlandse vertaling
U hebt gevraagd om deze site in het Nederlands te bezoeken. Voor nu wordt alleen de interface vertaald, maar nog niet alle inhoud.Als je me wilt helpen met vertalingen, is je bijdrage welkom. Het enige dat u hoeft te doen, is u op de site registreren en mij een bericht sturen waarin u wordt gevraagd om u toe te voegen aan de groep vertalers, zodat u de gewenste pagina's kunt vertalen. Een link onderaan elke vertaalde pagina geeft aan dat u de vertaler bent en heeft een link naar uw profiel.
Bij voorbaat dank.
Document heeft de 26/06/2006 gemaakt, de laatste keer de 26/10/2018 gewijzigd
Bron van het afgedrukte document:https://www.gaudry.be/nl/mysql-rf-using-encrypted-connections.html
De infobrol is een persoonlijke site waarvan de inhoud uitsluitend mijn verantwoordelijkheid is. De tekst is beschikbaar onder CreativeCommons-licentie (BY-NC-SA). Meer info op de gebruiksvoorwaarden en de auteur.
Referenties
Deze verwijzingen en links verwijzen naar documenten die geraadpleegd zijn tijdens het schrijven van deze pagina, of die aanvullende informatie kunnen geven, maar de auteurs van deze bronnen kunnen niet verantwoordelijk worden gehouden voor de inhoud van deze pagina.
De auteur Deze site is als enige verantwoordelijk voor de manier waarop de verschillende concepten, en de vrijheden die met de referentiewerken worden genomen, hier worden gepresenteerd. Vergeet niet dat u meerdere broninformatie moet doorgeven om het risico op fouten te verkleinen.