Re: Have an encrypted pgpass file

Поиск
Список
Период
Сортировка
От Tom Lane
Тема Re: Have an encrypted pgpass file
Дата
Msg-id 1772.1532440821@sss.pgh.pa.us
обсуждение исходный текст
Ответ на Re: Have an encrypted pgpass file  (Marco van Eck <marco.vaneck@gmail.com>)
Ответы Re: Have an encrypted pgpass file  (Marco van Eck <marco.vaneck@gmail.com>)
Список pgsql-hackers
Marco van Eck <marco.vaneck@gmail.com> writes:
> Indeed having unencrypted password lying (.pgpass or PGPASSWORD or -W)
> around is making my auditors unhappy, and forcing me to enter the password
> over and over again. With a simple test it seems the password entered by
> the user also stays in memory, since it is able to reset a broken
> connection. Finding the password in memory is not trivial, but prevention
> is always preferred.

> It might be an idea to wipe the password after the login, and decrypt/read
> it again if it needs to reconnect. Would this make the solution more
> secure? I had a quick look at the code and the patch would stay compact.
> Please let me know of doing this would make sense.

We're basically not going to accept any added complication that's designed
to prevent memory-inspection attacks, because in general that's a waste
of effort.  All you're doing is (slightly) reducing the attack window.

            regards, tom lane


В списке pgsql-hackers по дате отправления:

Предыдущее
От: "Daniel Verite"
Дата:
Сообщение: Re: Stored procedures and out parameters
Следующее
От: David Rowley
Дата:
Сообщение: Re: FailedAssertion on partprune