The frontend should also be prepared to handle an ErrorMessage
- response to SSLRequest from the server. This would only occur if
- th
e server predates the addition of SSL support
- to
PostgreSQL. (Such servers are now very ancient,
- and likely do not exist in the wild anymore.)
+ response to SSLRequest from the server. The frontend should not display
+ this error message to the user/application, since the server has not been
+ authenticated
In this case the connection must
be closed, but the frontend might choose to open a fresh connection
and proceed without requesting
SSL.
The frontend should also be prepared to handle an ErrorMessage
- response to GSSENCRequest from the server. This would only occur if
- the server predates the addition of
GSSAPI encryption
- support to
PostgreSQL. In this case the
- connection must be closed, but the frontend might choose to open a fresh
- connection and proceed without requesting
GSSAPI
- encryption.
+ response to GSSENCRequest from the server. The frontend should not display
+ this error message to the user/application, since the server has not been
+ authenticated
+ In this case the connection must be closed, but the frontend might choose
+ to open a fresh connection and proceed without requesting
{
/*
* Server failure of some sort, such as failure to
- * fork a backend process. We need to process and
- * report the error message, which might be formatted
- * according to either protocol 2 or protocol 3.
- * Rather than duplicate the code for that, we flip
- * into AWAITING_RESPONSE state and let the code there
- * deal with it. Note we have *not* consumed the "E"
- * byte here.
+ * fork a backend process. Don't bother retrieving
+ * the error message; we should not trust it as the
+ * server has not been authenticated yet.
*/
- conn->status = CONNECTION_AWAITING_RESPONSE;
- goto keep_going;
+ appendPQExpBuffer(&conn->errorMessage,
+ libpq_gettext("server sent an error response during SSL exchange\n"));
+ goto error_return;
}
else
{