Set up a root certificate for sever verification
Although this is an annual requirement, on this occasion the root certificate in the chain has also changed as Adobe’s TLS/SSL certificate provider have updated their certificate hierarchy. This can impact certain Postgres clients if their list of Certificate Authorities are missing the root cert. For example, a PSQL CLI client may need to have the root certs added to an explicit file
~/postgresql/root.crt
, otherwise this can result in an error. For example, psql: error: SSL error: certificate verify failed
. See the official PostgreSQL documentation for more information on this issue.The root certificate to add can be downloaded from https://cacerts.digicert.com/DigiCertGlobalRootG2.crt.pem.
To ensure a secure connection, SSL usage must be configured on both the client and the server before the connection is made. If the SSL is only configured on the server, the client might send sensitive information such as passwords before it is established that the server requires high security.
By default, PostgreSQL does not perform any verification of the server certificate. To verify the server’s identity and ensure a secure connection before any sensitive data is sent (as part of the SSL verify-full
mode), you must place a root (self-signed) certificate on your local machine (root.crt
) and a leaf certificate signed by the root certificate on the server.
If the sslmode
parameter is set to verify-full
, libpq will verify that the server is trustworthy by checking the certificate chain up to the root certificate stored on the client. It then verifies that the hostname matches the name stored in the server certificate.
To allow server certificate verification, you must place one or more root certificates (root.crt
) in the PostgreSQL file in your home directory. The file path would be similar to ~/.postgresql/root.crt
.