From: | Jacob Champion <jchampion(at)timescale(dot)com> |
---|---|
To: | Stephen Frost <sfrost(at)snowman(dot)net> |
Cc: | pgsql-hackers <pgsql-hackers(at)lists(dot)postgresql(dot)org>, Magnus Hagander <magnus(at)hagander(dot)net>, Peter Eisentraut <peter(dot)eisentraut(at)enterprisedb(dot)com>, Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us>, Robert Haas <robertmhaas(at)gmail(dot)com> |
Subject: | Re: Kerberos delegation support in libpq and postgres_fdw |
Date: | 2022-09-19 21:05:39 |
Message-ID: | 78ea2273-f370-5a78-903a-886511e2511c@timescale.com |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-hackers |
On 9/19/22 10:05, Stephen Frost wrote:
> This is coming across as if it's a surprise of some kind when it
> certainly isn't.. If the delegated credentials are being used to
> authenticate and establish the connection from that backend to another
> system then, yes, naturally that means that the keys provided are coming
> from the client and the client knows them.
I think it may be surprising to end users that credential delegation
lets them trivially break transport encryption. Like I said before, it
was a surprise to me, because the cryptosystems I'm familiar with
prevent that.
If it wasn't surprising to you, I could really have used a heads up back
when I asked you about it.
> The idea of arranging to
> have an admin's credentials used to authenticate to another system where
> the backend is actually controlled by a non-admin user is, in fact, the
> issue in what is being outlined above as that's clearly a situation
> where the user's connection is being elevated to an admin level.
Yes, controlled elevation is the goal in the scenario I'm describing.
> That's
> also something that we try to avoid having happen because it's not
> really a good idea, which is why we require a password today for the
> connection to be established (postgres_fdw/connection.c:
>
> Non-superuser cannot connect if the server does not request a password.
A password is being used in this scenario. The password is the secret
being stolen.
The rest of your email describes a scenario different from what I'm
attacking here. Here's my sample HBA line for the backend again:
hostgssenc all all ... password
I'm using password authentication with a Kerberos-encrypted channel.
It's similar to protecting password authentication with TLS and a client
cert:
hostssl all all ... password clientcert=verify-*
> Consider that, in general, the user could also simply directly connect
> to the other system themselves
No, because they don't have the password. They don't have USAGE on the
foreign table, so they can't see the password in the USER MAPPING.
With the new default introduced in this patch, they can now steal the
password by delegating their credentials and cracking the transport
encryption. This bypasses the protections that are documented for the
pg_user_mappings view.
> Consider SSH instead of PG. What you're pointing out, accurately, is
> that if an admin were to install their keys into a user's .ssh directory
> unencrypted and then the user logged into the system, they'd then be
> able to SSH to another system with the admin's credentials and then
> they'd need the admin's credentials to decrypt the traffic, but that if,
> instead, the user brings their own credentials then they could
> potentially decrypt the connection between the systems. Is that really
> the issue here?
No, it's not the issue here. This is more like setting up a restricted
shell that provides limited access to a resource on another machine
(analogous to the foreign table). The user SSHs into this restricted
shell, and then invokes an admin-blessed command whose implementation
uses some credentials (which they cannot read, analogous to the USER
MAPPING) over an encrypted channel to access the backend resource. In
this situation an admin would want to ensure that the encrypted tunnel
couldn't be weakened by the client, so that they can't learn how to
bypass the blessed command and connect to the backend directly.
Unlike SSH, we've never supported credential delegation, and now we're
introducing it. So my claim is, it's possible for someone who was
previously in a secure situation to be broken by the new default.
>> So the client can decrypt backend communications that make use of its
>> delegated key material. (This also means that gssencmode is a lot
>> weaker than I expected.)
>
> The backend wouldn't be able to establish the connection in the first
> place without those delegated credentials.
That's not true in the situation I'm describing; hopefully my comments
above help clarify.
> The server in the middle should *not* be using its own Kerberos
> credentials to establish the connection to the other system- that's
> elevating the credentials used for that connection and is something that
> should be prevented for non-superusers already (see above).
It's not prevented, because a password is being used. In my tests I'm
connecting as an unprivileged user.
You're claiming that the middlebox shouldn't be doing this. If this new
default behavior were the historical behavior, then I would have agreed.
But the cat's already out of the bag on that, right? It's safe today.
And if it's not safe today for some other reason, please share why, and
maybe I can work on a patch to try to prevent people from doing it.
Thanks,
--Jacob
From | Date | Subject | |
---|---|---|---|
Next Message | David Rowley | 2022-09-19 21:16:09 | Re: POC: GROUP BY optimization |
Previous Message | Jonathan S. Katz | 2022-09-19 20:52:06 | Re: why can't a table be part of the same publication as its schema |