From: | Stephen Frost <sfrost(at)snowman(dot)net> |
---|---|
To: | k(dot)yudhveer(at)gmail(dot)com, pgsql-bugs(at)lists(dot)postgresql(dot)org |
Subject: | Re: BUG #16079: Question Regarding the BUG #16064 |
Date: | 2019-10-28 15:47:54 |
Message-ID: | 20191028154754.GS6962@tamriel.snowman.net |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-bugs pgsql-hackers |
Greetings,
* PG Bug reporting form (noreply(at)postgresql(dot)org) wrote:
> As your team mentioned that LDAP process is not secured compared to the
> GSSAPI authentication.
No, it isn't.
> Can you clarify me this question, whenever the client provide his
> credentials to connect to the PostgreSQL server it will authenticated
> against the LDAP Server and then LDAP will direct the client connecttion to
> the Postgrers server. But the user credentials will not be sent to
> Postgresql server to authenticate.
Uh, the user's credentials certainly are sent to the PG server.
Here's a nice short patch that just prints out the user's password after
the server gets it when using LDAP auth. You'll see the results like
this in the log:
users password is: hello
> Because your team mentioned this statement " it's much more secure than
> using LDAP-based auth and avoids the user's password being
> sent to the PostgreSQL server (where it could be compromised if the
> PGprocess is compromised)."
Yes, that's correct, if the PG server is compromised then the user's
credentials, when using LDAP auth, can be captured.
> I am having user defined in the LDAP server with all the credentails and
> also same user in the postgres server.
I'm not sure what you're suggesting here, but the way LDAP auth in PG
works is that the user's password is sent to the PG server and then the
PG server turns around and tries to use it to authenticate to the LDAP
server and, if successful, the authentication is allowed, and if
unsuccessful, the authentication is denied. When using LDAP auth, we
don't look at the rolpassword column in pg_authid at all.
I do think it'd be a useful improvement to add a way to control who is
allowed to access a PG server (aka- authorization), perhaps through an
LDAP query to check it, while using Kerberos/GSSAPI authentication to
actually do the authentication, but there isn't a way to do that with PG
today.
Thanks,
Stephen
Attachment | Content-Type | Size |
---|---|---|
print-users-pw-ldap.patch | text/x-diff | 497 bytes |
From | Date | Subject | |
---|---|---|---|
Next Message | Tomas Vondra | 2019-10-28 16:24:46 | Re: memory problems and crash of db when deleting data from table with thousands of partitions |
Previous Message | Josef Machytka | 2019-10-28 15:18:59 | Re: memory problems and crash of db when deleting data from table with thousands of partitions |
From | Date | Subject | |
---|---|---|---|
Next Message | Robert Haas | 2019-10-28 15:48:49 | Re: strpos behavior change around empty substring in PG12 |
Previous Message | Tom Lane | 2019-10-28 15:41:38 | Re: Proposition to use '==' as synonym for 'IS NOT DISTINCT FROM' |