Hello everyone!
I'm attempting to set up MySQL replication with SSL encryption, and while I'm beginning to close in on the solution, there's one aspect of the process that I can't wrap my brain around relating to the way MySQL uses SSL.
According to the documentation on MySQL 5.0 (setting up SSL for client/server and setting up SSL for replication), the SSL connection can involve up to five pieces of information: the CA cert, the master's signed public and private keys, and the slave's signed public and private keys. What I don't understand is the need for these five components. My understanding of SSL (gleaned from the Wikipedia entry) is that SSL generally requires only three pieces: the CA certificate (shared by server and client), the server's public key (sent to the client, validated against the CA cert, and used to encrypt / decrypt communication to the server), and the server's private key (kept by the server and use to encrypt / decrypt communication to client).
So why in the MySQL replication SSL solution does the slave also have a public/private key pair signed against the same CA cert as the master's public/private key pair?