Re: Information of pg_stat_ssl visible to all users - Mailing list pgsql-hackers

From Magnus Hagander
Subject Re: Information of pg_stat_ssl visible to all users
Date
Msg-id CABUevEyhFa-EnAHKTfyk5V2M97_Jq-bGGGDC040h448S+KJcFw@mail.gmail.com
Whole thread Raw
In response to Re: Information of pg_stat_ssl visible to all users  (Bruce Momjian <bruce@momjian.us>)
Responses Re: Information of pg_stat_ssl visible to all users  (Stephen Frost <sfrost@snowman.net>)
List pgsql-hackers


On Sat, Aug 29, 2015 at 10:27 PM, Bruce Momjian <bruce@momjian.us> wrote:
On Tue, Jul  7, 2015 at 12:57:58PM -0400, Tom Lane wrote:
> Andres Freund <andres@anarazel.de> writes:
> > On 2015-07-07 12:03:36 -0400, Peter Eisentraut wrote:
> >> I think the DN is analogous to the remote user name, which we don't
> >> expose for any of the other authentication methods.
>
> > Huh?
>
> Peter's exactly right: there is no other case where you can tell what
> some other connection's actual OS username is.  You might *guess* that
> it's the same as their database username, but you don't know that,
> assuming you don't know how they authenticated.
>
> I'm not sure how security-critical this info really is, though.

I know I am coming in late here, but I know Heroku uses random user
names to allow a cluster to have per-user databases without showing
external user name details:

        => \du
                                        List of roles
           Role name    |                   Attributes                   | Member of
        ----------------+------------------------------------------------+-----------
         aafgrwewediiqz | 20 connections                                 | {}
         aaszwkfnholarh | 20 connections                                 | {}
         aatbelxbaeriwy | 20 connections                                 | {}
         aaxiwolkcxmbxo | 20 connections                                 | {}
         abbyljzgqaonjb | 20 connections                                 | {}

I can see them having problems with a user being able to see the SSL
remote user names of all connected users.


I'm pretty sure Heroku don't use client certificates.

And if they did, I would assume the client certificate would be issued to  aafgrwewediiqz, or possibly aafgrwewediiqz@customer.heroku.com or something along that line.

Client certificates don't show anything other than the username, unless you explicitly choose to put sensitive information in the CN. But we don't limit the view of the username in pg_stat_activity, even though people do put sensitive things in there (such as the customer name in case of shared hosting - everybody doesn't do what Heroku does).

So pg_stat_ssl doesn't show something that's not already visible.

--

pgsql-hackers by date:

Previous
From: Ashutosh Bapat
Date:
Subject: Re: Dependency between bgw_notify_pid and bgw_flags
Next
From: Magnus Hagander
Date:
Subject: Re: Information of pg_stat_ssl visible to all users