> On Mar 26, 2019, at 12:03 AM, Claudio Nanni <[email protected]> wrote:
> 
> Hi, 
> 
>         The rationale is that the system administrator can do anything on the 
> server (including manual edits to the DB files) anyway; thus, every user 
> already implicitly trusts that user with their data. 
> 
> The user that is the manager of the server(root in Linux) is not the owner of 
> the data. 
> So imho we should go exactly the opposite direction, trying to make more 
> complicated, not easier, to just do anything that's not strictly managing the 
> server. 
> Yes he can tamper files but one thing is doing that and another is that any 
> 'root' can read sensitive data, consider also MariaDB supports data at rest 
> encryption with third party external key management system. 

MariaDB already ships a “unix_socket” authn plugin by default. All the admin 
has to do in order to gain access to a user’s data is to enable that plugin for 
the user, drop privileges, then log in.

Arguably, this is just a default-configuration change that I’m suggesting: 
configure root@localhost to use unix_socket authn by default (on Linux).

-FG
_______________________________________________
Mailing list: https://launchpad.net/~maria-discuss
Post to     : [email protected]
Unsubscribe : https://launchpad.net/~maria-discuss
More help   : https://help.launchpad.net/ListHelp

Reply via email to