Re: BUG #10680: LDAP bind password leaks to log on failed authentication

Поиск
Список
Период
Сортировка
От Steven Siebert
Тема Re: BUG #10680: LDAP bind password leaks to log on failed authentication
Дата
Msg-id CAC3nzehhk7Bq0=ewDbx8NZWWg9zTtZXrKLmvFoxp03QH354KoQ@mail.gmail.com
обсуждение исходный текст
Ответ на Re: BUG #10680: LDAP bind password leaks to log on failed authentication  (Tom Lane <tgl@sss.pgh.pa.us>)
Список pgsql-bugs
Tom, thanks for the quick response =)

> If you had in mind to *force*
> people to use out-of-line secret storage, I agree that ain't happening.

That's certainly something I don't want to do at all, which is why I
expressed concern.  I didn't see the idea of using a token/variable to
identify that the password lives in another file in the previous
emails, sorry if I missed it.  Since this is the same idea I had
presented for the variables, this obviously works for me =)

> This sounds like more complication with no real benefit.

Depends on the perspective again, I guess.  To those attempting to use
PostgreSQL in a secure environment following NIST best practices -- it
is a benefit =).  But, like I mentioned, I've successfully mitigated
that in our situation, so it's just a thought for those coming behind
me.

Honestly, it is more complicated...and not really necessary in my
situation.  But, IMO, that goes the same for moving the passwords out
of the one config file and to other file(s), since I've already
provided a patch that solves the problem of having clear text
passwords in the log file by filtering which also retains the
debugging benefit.  Honestly, I can't really see how this new approach
does anything more for security than what I already provided....but
I'm more than happy to oblige.  If anyone has the patients to explain
it to me, I would appreciate it =).

I really just wanted to offer this solution to the community, which
does provide additional security (removing clear text passwords from
config files, optionally) using existing security mechanism available
(SSL support baked in already).  I can provide a patch for any
approach there consensus for.

>Also, we've generally avoided putting any strong encryption capability into core
> Postgres because of worries about US export regulations.  Perhaps that
> worry is obsolete, but I'm not sure.

Most of the US export restrictions were removed about 15ish years ago
- unless you're using encryption specifically designed for the
military, you're good.

Further, Postgres already provides native SSL support
(http://www.postgresql.org/docs/9.3/static/ssl-tcp.html)...and my
proposal simply piggy backs on this.  I wasn't suggesting to
incorporate any new encryption technologies.

Like I said, I'm quite OK with not implementing this more complicated
solution -- just wanted to offer it up since it popped into my head.

S

В списке pgsql-bugs по дате отправления:

Предыдущее
От: Tom Lane
Дата:
Сообщение: Re: BUG #10680: LDAP bind password leaks to log on failed authentication
Следующее
От: dom_fischer@web.de
Дата:
Сообщение: BUG #11729: Packaging not FHS conform