Re: BUG #10250: pgAdmin III 1.16.1 stores unescaped plaintext password

From: Stephen Frost <sfrost(at)snowman(dot)net>
To: dlo(at)isam(dot)kiwi
Cc: pgsql-bugs(at)postgresql(dot)org
Subject: Re: BUG #10250: pgAdmin III 1.16.1 stores unescaped plaintext password
Date: 2014-05-07 15:44:31
Message-ID: 20140507154431.GW2556@tamriel.snowman.net
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgadmin-hackers pgsql-bugs

Ben,

* dlo(at)isam(dot)kiwi (dlo(at)isam(dot)kiwi) wrote:
> When storing credentials for connections into ~/.pgpass the credentials is
> stored in delimited plaintext form. Not only is this practise a security
> risk,

This isn't a bug, it's intentional, and if it goes against your security
requirements then simply don't do it. Storing it in .pgpass encrypted
would require a password to either be provided (in which case, just
don't have the password in the pgpass file..) or for the key to be
stored in plain-text somewhere, which would be the same situation.

Perhaps there is a feature request in here somewhere to have an
ssh-agent like daemon, but there simply hasn't been demand for it.

> but when the credential contains the delimiter (colon) it fails to be
> read back out and app responds with "invalid credentials".
>
> x.x.x.x:5432:*:username:password:with:colons

Per the fine documentation, you need to escape any such usage with a
backslash. Please review:

http://www.postgresql.org/docs/9.3/static/libpq-pgpass.html

Thanks,

Stephen

In response to

Responses

Browse pgadmin-hackers by date

  From Date Subject
Next Message Guillaume Lelarge 2014-05-07 18:10:29 New columns in 9.4 pg_stat_activity
Previous Message dlo 2014-05-07 04:32:48 BUG #10250: pgAdmin III 1.16.1 stores unescaped plaintext password

Browse pgsql-bugs by date

  From Date Subject
Next Message Leif Jensen 2014-05-07 15:46:40 Re: Server process crash - Segmentation fault
Previous Message christopher.hamel 2014-05-07 15:24:36 BUG #10254: Joined Constraints not invoked on date ranges