From: | Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us> |
---|---|
To: | Justin Pryzby <pryzby(at)telsasoft(dot)com> |
Cc: | Todd Hubers <todd(dot)hubers(at)gmail(dot)com>, pgsql-hackers(at)lists(dot)postgresql(dot)org |
Subject: | Re: Feature Proposal: Connection Pool Optimization - Change the Connection User |
Date: | 2021-11-20 21:16:45 |
Message-ID: | 3321529.1637443005@sss.pgh.pa.us |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-hackers |
Justin Pryzby <pryzby(at)telsasoft(dot)com> writes:
> On Sun, Nov 21, 2021 at 03:11:03AM +1100, Todd Hubers wrote:
>> - Google Document with Commenting turned on
>> https://docs.google.com/document/d/1u6mVKEHfKtR80UrMLNYrp5D6cCSW1_arcTaZ9HcAKlw/edit?usp=sharing.
> You proposed a PQ protocol version of SET ROLE/SET SESSION authorization.
> You'd need to make sure that a client connected to the connection pooler cannot
> itself run the PQ "set role".
It's not really apparent to me how this mechanism wouldn't be a giant
security hole. In particular, I see no meaningful difference between
granting the proposed "impersonate" privilege and granting superuser.
You could restrict it to not allow impersonating superusers, which'd
make it a little better, but what of all the predefined roles we keep
inventing that have privileges we don't want to be accessible to Joe
User? I think by the time you got to something where "impersonate"
wasn't a security hole, it would be pretty much equivalent to SET ROLE,
ie you could only impersonate users you'd been specifically given the
privlege for.
It also seems like this is transferring the entire responsibility for
user authentication onto the middleware, with the server expected to
just believe that the session should now be allowed to act as user X.
Again, that seems more like a security problem than a good design.
Another issue is that the proposed implementation seems pretty far
short of being an invisible substitute for actually logging in as
the target user. For starters, what of instantiating ALTER ROLE SET
parameter values that apply to the target user, and getting rid of
such settings that applied to the original user ID? How would this
interact with the "on login" triggers that people keep asking for?
Also, you'd still have to do DISCARD ALL (at least) when switching
users, or else integrate all that cache-flushing right into the
switching mechanism. So I'm not entirely convinced about how big
the performance benefits are compared to a fresh session.
One more point is that the proposed business about
* ImpersonateDatabaseUser will either succeed silently (0-RTT), or
fail. Upon failure, no further commands will be processed until
ImpersonateDatabaseUser succeeds.
seems to require adding a huge amount of complication on the server side,
and complication in the protocol spec itself, to save a rather minimal
amount of complication in the middleware. Why can't we just say that
a failed "impersonate" command leaves the session in the same state
as before, and it's up to the pooler to do something about it? We are
in any case trusting the pooler not to send commands from user A to
a session logged in as user B.
regards, tom lane
PS: I wonder how we test such a feature meaningfully without
incorporating a pooler right into the Postgres tree. I don't
want to do that, for sure.
From | Date | Subject | |
---|---|---|---|
Next Message | Tom Lane | 2021-11-20 21:57:56 | Re: Improving psql's \password command |
Previous Message | Heikki Linnakangas | 2021-11-20 20:22:30 | Re: RecoveryInProgress() has critical side effects |