Re: [HACKERS] Log of CREATE USER statement

2005-12-18 Thread Andreas Pflug
Peter Eisentraut wrote: Letting createuser.c hash the password would be the biggest win. Both of these things are now done, and I have sent notices to pgadmin and phppgadmin asking for equivalent adjustments. Um, didn't receive a notice. I'm a little uncomfortable using an arbitrary md5

Re: [HACKERS] Log of CREATE USER statement

2005-12-17 Thread Peter Eisentraut
Marko Kreen wrote: Maybe we should provide a backslash command in psql for secure password entry, say, \password [username]. This would then ask for the password through a somewhat secure, unlogged channel, encrypt it, and send an ALTER ROLE command to the server. Letting createuser.c

Re: [HACKERS] Log of CREATE USER statement

2005-12-12 Thread Ricardo Vaz
Dear friends, I thank you for all replies. If you permit, I'd like to present my modest view of the problem. I agree with Tom when he says: ... if the user wishes the password to be secure, he needs to encrypt it on the client side. Anything else is just the illusion of security. and with

Re: [HACKERS] Log of CREATE USER statement

2005-12-12 Thread Marko Kreen
On 12/9/05, Peter Eisentraut [EMAIL PROTECTED] wrote: Tom Lane wrote: As I said already, if the user wishes the password to be secure, he needs to encrypt it on the client side. Maybe we should provide a backslash command in psql for secure password entry, say, \password [username]. This

Re: [HACKERS] Log of CREATE USER statement

2005-12-10 Thread Simon Riggs
On Fri, 2005-12-09 at 19:41 +0100, Peter Eisentraut wrote: Tom Lane wrote: As I said already, if the user wishes the password to be secure, he needs to encrypt it on the client side. Maybe we should provide a backslash command in psql That is a good option, but not the only option

Re: [HACKERS] Log of CREATE USER statement

2005-12-10 Thread Tom Lane
Simon Riggs [EMAIL PROTECTED] writes: On Fri, 2005-12-09 at 19:41 +0100, Peter Eisentraut wrote: Maybe we should provide a backslash command in psql That is a good option, but not the only option required. There are many reasons to need to supply the password as part of a command, rather

Re: [HACKERS] Log of CREATE USER statement

2005-12-10 Thread Simon Riggs
On Sat, 2005-12-10 at 11:15 -0500, Tom Lane wrote: Simon Riggs [EMAIL PROTECTED] writes: On Fri, 2005-12-09 at 19:41 +0100, Peter Eisentraut wrote: Maybe we should provide a backslash command in psql That is a good option, but not the only option required. There are many reasons to

[HACKERS] Log of CREATE USER statement

2005-12-09 Thread Ricardo Vaz - TCESP
Title: Log of CREATE USER statement Hi, I need to log any statement in my postgresql server. However, I would like that the password defined in CREATE USER statement was registered in MD5 format, independent of the form as it was specified in that statement. For example, if the user

Re: [HACKERS] Log of CREATE USER statement

2005-12-09 Thread Tom Lane
Ricardo Vaz - TCESP [EMAIL PROTECTED] writes: However, I would like that the password defined in CREATE USER statement was registered in MD5 format, independent of the form as it was specified in that statement. Not going to happen --- we are not going to add that sort of analysis to the

Re: [HACKERS] Log of CREATE USER statement

2005-12-09 Thread Bruce Momjian
Tom Lane wrote: Ricardo Vaz - TCESP [EMAIL PROTECTED] writes: However, I would like that the password defined in CREATE USER statement was registered in MD5 format, independent of the form as it was specified in that statement. Not going to happen --- we are not going to add that sort of

Re: [HACKERS] Log of CREATE USER statement

2005-12-09 Thread Peter Eisentraut
Tom Lane wrote: However, I would like that the password defined in CREATE USER statement was registered in MD5 format, independent of the form as it was specified in that statement. Not going to happen --- we are not going to add that sort of analysis to the statement logging code, as the

Re: [HACKERS] Log of CREATE USER statement

2005-12-09 Thread Tom Lane
Bruce Momjian pgman@candle.pha.pa.us writes: One issue I have not heard is that CREATE USER, with the visible password, is sent over the wire in cleartext, and does appear in the logs, as we discussed, so while we MD5 the password in pg_shadow so administrators do not see it, we do log the

Re: [HACKERS] Log of CREATE USER statement

2005-12-09 Thread Tom Lane
Peter Eisentraut [EMAIL PROTECTED] writes: Users who choose a password should have the assurance that the password cannot be seen in plain-text by anyone anywhere. In a PostgreSQL system, the password can be seen in all kinds of places, like the psql history, the server log, the activity

Re: [HACKERS] Log of CREATE USER statement

2005-12-09 Thread Bruce Momjian
Tom Lane wrote: Peter Eisentraut [EMAIL PROTECTED] writes: Users who choose a password should have the assurance that the password cannot be seen in plain-text by anyone anywhere. In a PostgreSQL system, the password can be seen in all kinds of places, like the psql history, the

Re: [HACKERS] Log of CREATE USER statement

2005-12-09 Thread Joshua D. Drake
On Fri, 2005-12-09 at 13:03 -0500, Bruce Momjian wrote: Tom Lane wrote: Peter Eisentraut [EMAIL PROTECTED] writes: Users who choose a password should have the assurance that the password cannot be seen in plain-text by anyone anywhere. In a PostgreSQL system, the password can be

Re: [HACKERS] Log of CREATE USER statement

2005-12-09 Thread Peter Eisentraut
Tom Lane wrote: To put that more clearly: if the point is to keep the user's cleartext password out of the hands of the DBA, then the user has already blown it by sending the password in cleartext in the first place. An untrustworthy DBA could trivially insert code into CREATE USER to log

Re: [HACKERS] Log of CREATE USER statement

2005-12-09 Thread Peter Eisentraut
Tom Lane wrote: As I said already, if the user wishes the password to be secure, he needs to encrypt it on the client side. Maybe we should provide a backslash command in psql for secure password entry, say, \password [username]. This would then ask for the password through a somewhat

Re: [HACKERS] Log of CREATE USER statement

2005-12-09 Thread Tom Lane
Bruce Momjian pgman@candle.pha.pa.us writes: Tom Lane wrote: As I said already, if the user wishes the password to be secure, he needs to encrypt it on the client side. Anything else is just the illusion of security. Thinking some more, does encoding on the client side really improve

Re: [HACKERS] Log of CREATE USER statement

2005-12-09 Thread Bruce Momjian
Peter Eisentraut wrote: Tom Lane wrote: As I said already, if the user wishes the password to be secure, he needs to encrypt it on the client side. Maybe we should provide a backslash command in psql for secure password entry, say, \password [username]. This would then ask for the

Re: [HACKERS] Log of CREATE USER statement

2005-12-09 Thread Tom Lane
Peter Eisentraut [EMAIL PROTECTED] writes: Maybe we should provide a backslash command in psql for secure password entry, say, \password [username]. This would then ask for the password through a somewhat secure, unlogged channel, encrypt it, and send an ALTER ROLE command to the server.