Re: BUG #16682: The pg_user_mapping table saves the plaintext password

From: Michael Paquier <michael(at)paquier(dot)xyz>
To: Daniel Gustafsson <daniel(at)yesql(dot)se>
Cc: abcxiaod(at)126(dot)com, pgsql-bugs(at)lists(dot)postgresql(dot)org
Subject: Re: BUG #16682: The pg_user_mapping table saves the plaintext password
Date: 2020-10-23 03:22:42
Message-ID: 20201023032242.GC5180@paquier.xyz
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-bugs

On Thu, Oct 22, 2020 at 10:16:46AM +0200, Daniel Gustafsson wrote:
> > On 22 Oct 2020, at 09:14, PG Bug reporting form <noreply(at)postgresql(dot)org> wrote:
>
> > Whether the plaintext password in this system table system view has security
> > risks, is it considered a security vulnerability?
>
> This is as intended, and documented on the pg_user_mapping catalog
> description and the pg_user_mappings view:
>
> https://www.postgresql.org/docs/12/catalog-pg-user-mapping.html
> https://www.postgresql.org/docs/12/view-pg-user-mappings.html
>
> The umoptions field is not visible to restricted users.

If you care about such things, there are more options on the table
like pgpass files or certificate-based authentication methods just to
name two of these. Much more options are supported.
--
Michael

In response to

Browse pgsql-bugs by date

  From Date Subject
Next Message PG Bug reporting form 2020-10-23 10:26:52 BUG #16683: explain plan format xml produces invalid xml
Previous Message Tom Lane 2020-10-22 14:01:57 Re: BUG #16329: Valgrind detects an invalid read when building a gist index with buffering