railwayapp-templates / postgres-ssl

MIT License
8 stars 25 forks source link

Unable to connect from a Rust application #6

Closed ramnivas closed 3 months ago

ramnivas commented 12 months ago

I am trying to deploy a Rust application that uses a Railway Postgres service. I cannot connect to the Postgres service from my Rust app (running on my laptop) using either OpenSSL or Rustls (with native certificates).

Here is a reproducible example: https://github.com/ramnivas/railway-postgres-rust

Here is the error I get, which, I believe, points to the SSL certificate provisioned by this service.

With Rustls (with native certs):

Error { kind: Tls, cause: Some(Custom { kind: InvalidData, error: InvalidCertificate(UnknownIssuer) }) }

With OpenSSL:

Error { kind: Tls, cause: Some(ConnectError { error: Error { code: ErrorCode(1), cause: Some(Ssl(ErrorStack([Error { code: 369098857, library: "STORE routines", function: "ossl_store_get0_loader_int", reason: "unregistered scheme", file: "crypto/store/store_register.c", line: 237, data: "scheme=file" }, Error { code: 2147483650, library: "system library", function: "file_open", file: "providers/implementations/storemgmt/file_store.c", line: 267, data: "calling stat(/nix/store/nii4qs05l95b6lva5sr75kslc0pdrmym-openssl-3.0.9/etc/ssl/certs)" }, Error { code: 369098857, library: "STORE routines", function: "ossl_store_get0_loader_int", reason: "unregistered scheme", file: "crypto/store/store_register.c", line: 237, data: "scheme=file" }, Error { code: 2147483650, library: "system library", function: "file_open", file: "providers/implementations/storemgmt/file_store.c", line: 267, data: "calling stat(/nix/store/nii4qs05l95b6lva5sr75kslc0pdrmym-openssl-3.0.9/etc/ssl/certs)" }, Error { code: 369098857, library: "STORE routines", function: "ossl_store_get0_loader_int", reason: "unregistered scheme", file: "crypto/store/store_register.c", line: 237, data: "scheme=file" }, Error { code: 2147483650, library: "system library", function: "file_open", file: "providers/implementations/storemgmt/file_store.c", line: 267, data: "calling stat(/nix/store/nii4qs05l95b6lva5sr75kslc0pdrmym-openssl-3.0.9/etc/ssl/certs)" }, Error { code: 167772294, library: "SSL routines", function: "tls_post_process_server_certificate", reason: "certificate verify failed", file: "ssl/statem/statem_clnt.c", line: 1890 }]))) }, verify_result: X509VerifyResult { code: 19, error: "self-signed certificate in certificate chain" } }) }
ramnivas commented 12 months ago

Also note, if I add a query parameter sslmode=disable, the connection is established, but of course, that doesn't seem the right way to go,

joggienl commented 12 months ago

If you are using the default Postgresql service from Railway, it uses a self signed certificate. It might be that Rust is not allowing that by default, so there might be an option to allow it.

I do not know how you would do that in Rust, for javascript/typescript when using pg there is an option called rejectUnauthorized which can be set to false.

Hope this helps!

ramnivas commented 12 months ago

@joggienl The equivalent option in Rust is the?sslmode=disable query parameter, which works, but seems unsafe.

joggienl commented 12 months ago

@ramnivas, no that is not the same. The rejectUnauthorized is meant to manually "trust" unsafe certificate while still using SSL. The sslmode param is simply requesting to totally disable SSL, which indeed is unsafe.

Trusting unsafe certificates is obviously something you should only do if you know where you are connecting to.

*edit: I hope this difference makes a bit sense. The rejectUnauthorized is handled by the client, the sslmode is requesting the server to allow non-ssl connections. So the rejectUnauthorized is something you configure your client with and that is why sslmode is added like a queryparam because it is being sent to the server.

ramnivas commented 12 months ago

Good point. I guess a better equivalent would be to implement a custom verifier (for example, in Rustls https://docs.rs/rustls/latest/rustls/client/trait.ServerCertVerifier.html). But the core issue remains, since there may not be a good way to safely verify such self-signed certificate.

joggienl commented 12 months ago

I do not know what to advise here, in general you should be able to have an option to either ignore SSL errors on the client or have an option more specifically for self signed certificates. Hope you'll find that out!

ramnivas commented 12 months ago

Thanks for your help.

As far as I see, there is no good solution to use this service from Rust. Ignoring SSL errors in client can be managed through some code, but carries the risk of MTM attacks.

A solution would be to change this service along the lines of Yugabyte [1][2] by publishing a PEM file. Then I could add builder.set_ca_file("database_cert.pem") for a proper validation. But maintainers of this services would need to decide it that is something they want to pursue.

[1] https://docs.yugabyte.com/preview/drivers-orms/orms/nodejs/ysql-prisma/#specify-the-configuration [2] https://docs.yugabyte.com/preview/yugabyte-cloud/cloud-secure-clusters/cloud-authentication/#download-your-cluster-certificate

joggienl commented 12 months ago

Having a valid certificate on the service side is imo the best solution, I think that is what you are implying here. Another solution for your specific use case could be to custom add Postgresql to your project and only allow access via the private network (you can do that by removing the DATABASE_URL environment variable and removing the TCP proxy)

ramnivas commented 11 months ago

@joggienl

Having a valid certificate on the service side is imo the best solution, I think that is what you are implying here.

Exactly.

I am giving the private network a try by using g $DATABASE_PRIVATE_URL with sslmode=disable, which seems safe since the private network isn't available for anyone to introduce a MITM attack (I am running into issues with my app, unable to resolve the hostname, but that is a separate use).

However, this still exposes public usage to MITM (my apps setup requires some operations from outside the server).

ramnivas commented 11 months ago

@joggienl For context: I am trying to deploy Exograph to Railway with an eye on providing a template to get a nice "one-click" deployment experience.

With private networking (assuming that I can overcome the host resolution issue), I think the server->database will be okay. However, certain usages, such as migrations and schema verification, require access from developer machines or other non-project machines. This is where I am uncomfortable with the use of public database URL

joggienl commented 11 months ago

Hey @ramnivas , looks nice Exograph, haven't looked into that one. Saved to (long) list!

About the network issues: there is a small delay in which the private network becomes available (about 100ms I believe). It is described in the Railway docs. You could try to add ?connect_timeout=300 to the postgresql connection string (if that is where the problem is). That might help.

Another caveat is that if you are using Alpine images, you need to add ENABLE_ALPINE_PRIVATE_NETWORKING=true to the environment variables of those images see the docs here.

As for the need for public access for setup, maybe you can add a container to the project that does this setup? You could custom build a docker image to pull that off, and maybe some docs that describe that it can be deleted afterwards (if necessary). Just a thought, there might be other or even better ways to do it ;-)

melissa-hale commented 9 months ago

I wonder if this issue is related to this community feedback post: https://community.railway.app/feedback/generate-v3-x-v509-certs-for-postgres-te-370861a1

I'd love to make time for implementing improvements to our postres images soon™️, and this is on my radar. In the meantime, I'm always happy to review PRs.

ramnivas commented 9 months ago

@melissa-hale I don't think they are directly related since the issue exists even with OpenSSL. The core issue here is that Railway Postgres uses a self-signed certificate, so clients have no real way to connect over SSL.

melissa-hale commented 9 months ago

Okay, thanks @ramnivas. Will keep this in mind. Not sure of any timeline, but will keep you posted on our decisions. I know you were trying to build a template for Exograph, are you blocked because of this?

ramnivas commented 9 months ago

Thanks @melissa-hale.

I am not quite blocked (https://exograph.dev/docs/deployment/railway), but I had to go for a sub-optimal solution:

As for the template, I am blocked on a different issue (there is no way to express dependency between components). For example, I want to start Exograph only after the Postgres service is up and running (there are workarounds, such as using nc to keep waiting for Postgres to accept connection, but those aren't elegant).

melissa-hale commented 9 months ago

Wow this is great feedback @ramnivas , thanks for taking the time to type it out.

That leaves the issue with the self-signed cert which we can continue tracking here.

ramnivas commented 8 months ago

Happy to be of help, @melissa-hale. I will keep an eye on changes in these areas.

brody192 commented 3 months ago

Hey all, this was fixed in PR #15

Once new images are published all you would need to do is redeploy, the added logic will detect the invalid certificate and regenerate it for you.

Two community members have confirmed the changes made in PR 15 worked for them with rustls.

brody192 commented 3 months ago

Additionally, Railway now supports private networking during build when you enable the new builder in your service settings!