From: | Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us> |
---|---|
To: | Steven Siebert <smsiebe(at)gmail(dot)com> |
Cc: | Bruce Momjian <bruce(at)momjian(dot)us>, Magnus Hagander <magnus(at)hagander(dot)net>, Stephen Frost <sfrost(at)snowman(dot)net>, pgsql-bugs <pgsql-bugs(at)postgresql(dot)org> |
Subject: | Re: BUG #10680: LDAP bind password leaks to log on failed authentication |
Date: | 2014-10-20 14:44:37 |
Message-ID: | 4300.1413816277@sss.pgh.pa.us |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-bugs |
Steven Siebert <smsiebe(at)gmail(dot)com> writes:
> Moving the secrets to another file will indeed fix this problem, and I
> really don't think it'll take very much to implement this. As you
> mentioned, this increases the complexity of the configuration process,
> and I certainly don't want to impose our backwards incompatible change
> (on upgrade, they would need to create those new files) on everyone
> else in the community.
I'm not following what's backwards incompatible about it? As I see it,
this would require some new syntax ("@filename" perhaps?) that you
could optionally use in place of a secret. If you had in mind to *force*
people to use out-of-line secret storage, I agree that ain't happening.
> My counter proposal is to optionally allow dbas to encrypt the secrets
> used in the configuration file by substituting the actual password
> with a variable.
This sounds like more complication with no real benefit. Also, we've
generally avoided putting any strong encryption capability into core
Postgres because of worries about US export regulations. Perhaps that
worry is obsolete, but I'm not sure.
regards, tom lane
From | Date | Subject | |
---|---|---|---|
Next Message | Steven Siebert | 2014-10-20 15:16:30 | Re: BUG #10680: LDAP bind password leaks to log on failed authentication |
Previous Message | dom_fischer | 2014-10-20 14:34:32 | BUG #11729: Packaging not FHS conform |