Re: BUG #10680: LDAP bind password leaks to log on failed authentication

From: Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us>
To: Steven Siebert <smsiebe(at)gmail(dot)com>
Cc: Bruce Momjian <bruce(at)momjian(dot)us>, Magnus Hagander <magnus(at)hagander(dot)net>, Stephen Frost <sfrost(at)snowman(dot)net>, pgsql-bugs <pgsql-bugs(at)postgresql(dot)org>
Subject: Re: BUG #10680: LDAP bind password leaks to log on failed authentication
Date: 2014-10-20 14:44:37
Message-ID: 4300.1413816277@sss.pgh.pa.us
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-bugs

Steven Siebert <smsiebe(at)gmail(dot)com> writes:
> Moving the secrets to another file will indeed fix this problem, and I
> really don't think it'll take very much to implement this. As you
> mentioned, this increases the complexity of the configuration process,
> and I certainly don't want to impose our backwards incompatible change
> (on upgrade, they would need to create those new files) on everyone
> else in the community.

I'm not following what's backwards incompatible about it? As I see it,
this would require some new syntax ("@filename" perhaps?) that you
could optionally use in place of a secret. If you had in mind to *force*
people to use out-of-line secret storage, I agree that ain't happening.

> My counter proposal is to optionally allow dbas to encrypt the secrets
> used in the configuration file by substituting the actual password
> with a variable.

This sounds like more complication with no real benefit. Also, we've
generally avoided putting any strong encryption capability into core
Postgres because of worries about US export regulations. Perhaps that
worry is obsolete, but I'm not sure.

regards, tom lane

In response to

Responses

Browse pgsql-bugs by date

  From Date Subject
Next Message Steven Siebert 2014-10-20 15:16:30 Re: BUG #10680: LDAP bind password leaks to log on failed authentication
Previous Message dom_fischer 2014-10-20 14:34:32 BUG #11729: Packaging not FHS conform