Re: FPW compression leaks information

Поиск
Список
Период
Сортировка
От Heikki Linnakangas
Тема Re: FPW compression leaks information
Дата
Msg-id 559BD260.8080106@iki.fi
обсуждение исходный текст
Ответ на Re: FPW compression leaks information  (Stephen Frost <sfrost@snowman.net>)
Ответы Re: FPW compression leaks information  (Stephen Frost <sfrost@snowman.net>)
Список pgsql-hackers
On 07/07/2015 04:15 PM, Stephen Frost wrote:
> * Fujii Masao (masao.fujii@gmail.com) wrote:
>> On Thu, Apr 16, 2015 at 4:26 PM, Michael Paquier
>> <michael.paquier@gmail.com> wrote:
>>> +         the compression ratio of a full page image gives a hint of what is
>>> +         the existing data of this page.  Tables that contain sensitive
>>> +         information like <structname>pg_authid</structname> with password
>>> +         data could be potential targets to such attacks. Note that as a
>>> +         prerequisite a user needs to be able to insert data on the same page
>>> +         as the data targeted and need to be able to detect checkpoint
>>> +         presence to find out if a compressed full page write is included in
>>> +         WAL to calculate the compression ratio of a page using WAL positions
>>> +         before and after inserting data on the page with data targeted.
>>> +        </para>
>>> +       </warning>
>>
>> I think that, in addition to the description of the risk, it's better to
>> say that this vulnerability is cumbersome to exploit in practice.
>>
>> Attached is the updated version of the patch. Comments?
>
> Personally, I don't like simply documenting this issue.  I'd much rather
> we restrict the WAL info as it's really got no business being available
> to the general public.  I'd be fine with restricting that information to
> superusers when compression is enabled, or always, for 9.5 and then
> fixing it properly in 9.6 by allowing it to be visible to a
> "pg_monitoring" default role which admins can then grant to users who
> should be able to see it.

Well, then you could still launch the same attack if you have the 
pg_monitoring privileges. So it would be more like a "monitoring and 
grab everyone's passwords" privilege ;-). Ok, in seriousness the attack 
isn't that easy to perform, but I still wouldn't feel comfortable giving 
that privilege to anyone who isn't a superuser anyway.

> Yes, we'll get flak from people who are running with non-superuser
> monitoring tools today, but we already have a bunch of superuser-only
> things that monioring tools want, so this doesn't move the needle
> particularly far, in my view.

That would be a major drawback IMHO, and a step in the wrong direction.

- Heikki




В списке pgsql-hackers по дате отправления:

Предыдущее
От: Stephen Frost
Дата:
Сообщение: Re: FPW compression leaks information
Следующее
От: Oskari Saarenmaa
Дата:
Сообщение: Re: Repeated pg_upgrade buildfarm failures on binturon