Re: pgaudit - an auditing extension for PostgreSQL - Mailing list pgsql-hackers

From Bruce Momjian
Subject Re: pgaudit - an auditing extension for PostgreSQL
Date
Msg-id 20140512010104.GC20811@momjian.us
Whole thread Raw
In response to Re: pgaudit - an auditing extension for PostgreSQL  (Tom Lane <tgl@sss.pgh.pa.us>)
Responses Re: pgaudit - an auditing extension for PostgreSQL
List pgsql-hackers
On Sun, May  4, 2014 at 11:12:57AM -0400, Tom Lane wrote:
> Stephen Frost <sfrost@snowman.net> writes:
> > * Abhijit Menon-Sen (ams@2ndquadrant.com) wrote:
> >> 1. I wish it were possible to prevent even the superuser from disabling
> >> audit logging once it's enabled, so that if someone gained superuser
> >> access without authorisation, their actions would still be logged.
> >> But I don't think there's any way to do this.
> 
> > Their actions should be logged up until they disable auditing and
> > hopefully those logs would be sent somewhere that they're unable to
> > destroy (eg: syslog).  Of course, we make that difficult by not
> > supporting log targets based on criteria (logging EVERYTHING to syslog
> > would suck).
> 
> > I don't see a way to fix this, except to minimize the amount of things
> > requiring superuser to reduce the chances of it being compromised, which
> > is something I've been hoping to see happen for a long time.
> 
> Prohibiting actions to the superuser is a fundamentally flawed concept.
> If you do that, you just end up having to invent a new "more super"
> kind of superuser who *can* do whatever it is that needs to be done.

We did create a "replication" role that could only read data, right?  Is
that similar?

--  Bruce Momjian  <bruce@momjian.us>        http://momjian.us EnterpriseDB
http://enterprisedb.com
 + Everyone has their own god. +



pgsql-hackers by date:

Previous
From: Peter Eisentraut
Date:
Subject: [PATCH] empty xml values
Next
From: Kouhei Kaigai
Date:
Subject: Re: [v9.5] Custom Plan API