Re: Redact user password on pg_stat_statements

Поиск
Список
Период
Сортировка
От Greg Sabino Mullane
Тема Re: Redact user password on pg_stat_statements
Дата
Msg-id CAKAnmmLyAMqSi0PUgOR4UsaF4xEkKWaqzS=GMOdbe6sDQecf4Q@mail.gmail.com
обсуждение исходный текст
Ответ на Re: Redact user password on pg_stat_statements  (Sami Imseih <samimseih@gmail.com>)
Ответы Re: Redact user password on pg_stat_statements
Список pgsql-hackers
On Tue, Feb 25, 2025 at 10:12 AM Sami Imseih <samimseih@gmail.com> wrote:
> What about a more general solution, such as a flag to turn off logging of ALTER ROLE statements completely?

IMO, flags for a specific type of utility statement seems way too much for pg_stat_statements, and this will also not completely prevent leaking plain text passwords from all ways that CREATE/ALTER ROLE could be run, i.e. DO blocks, inside functions/procs with track=all.

Well sure, but best effort is better than no effort at all. Preventing CREATE/ALTER will catch 99% of items, and as I advocated, there really is no reason for them to be in pg_stat_statements in the first place.
 
The clients that set passwords could simply turn off track_utility on a user/transaction level while they are performing the action with
sensitive data.

Good point, but that relies on the client to do the right thing, and requires two extra steps.


Cheers,
Greg

--
Enterprise Postgres Software Products & Tech Support

В списке pgsql-hackers по дате отправления: