Exposure related to GUC value of ssl_passphrase_command - Mailing list pgsql-hackers

From Moon, Insung
Subject Exposure related to GUC value of ssl_passphrase_command
Date
Msg-id CAEMmqBuHVGayc+QkYKgx3gWSdqwTAQGw+0DYn3WhcX-eNa2ntA@mail.gmail.com
Whole thread Raw
Responses Re: Exposure related to GUC value of ssl_passphrase_command  (Amit Langote <amitlangote09@gmail.com>)
List pgsql-hackers
Deal Hackers.

The value of ssl_passphrase_command is set so that an external command
is called when the passphrase for decrypting an SSL file such as a
private key is obtained.
Therefore, easily set to work with echo "passphrase" or call to
another get of passphrase application.

I think that this GUC value doesn't contain very sensitive data,
but just in case, it's dangerous to be visible to all users.
I think do not possible these cases, but if a used echo external
commands or another external command,  know what application used to
get the password, maybe we can't be convinced that there's the safety
of using abuse by backtracking on applications.
So I think to the need only superusers or users with the default role
of pg_read_all_settings should see these values.

Patch is very simple.
How do you think about my thoughts like this?

Best regards.
Moon.

Attachment

pgsql-hackers by date:

Previous
From: Kyotaro Horiguchi
Date:
Subject: Re: [proposal] recovery_target "latest"
Next
From: "Moon, Insung"
Date:
Subject: Re: Wrong value in metapage of GIN INDEX.