Re: [PoC] Federated Authn/z with OAUTHBEARER - Mailing list pgsql-hackers
From | Jacob Champion |
---|---|
Subject | Re: [PoC] Federated Authn/z with OAUTHBEARER |
Date | |
Msg-id | CAOYmi+kn+NYA=DNMZds8sPXonAFg3dJnTgQ+vsOMXsk1Yz+3Gg@mail.gmail.com Whole thread Raw |
In response to | Re: [PoC] Federated Authn/z with OAUTHBEARER (Bruce Momjian <bruce@momjian.us>) |
Responses |
Re: [PoC] Federated Authn/z with OAUTHBEARER
|
List | pgsql-hackers |
Hi all, With the understanding that the patchset is no longer just "my" baby... = Dependencies = I like seeing risk/reward discussions. I agonized over the choice of HTTP dependency, and I transitioned from an "easier" OAuth library over to Curl early on because of the same tradeoffs. That said... Tom, I think the dependency list you've presented is not quite fair, because it doesn't show what libpq's dependency list was before adding Curl. From your email, and my local Rocky 9 install, I think these are the net-new dependencies that we (and packagers) need to worry about: libcurl.so.4 libnghttp2.so.14 libidn2.so.0 libssh.so.4 libpsl.so.5 libunistring.so.2 libbrotlidec.so.1 libbrotlicommon.so.1 libz.so.1 That's more than I'd like, to be perfectly honest. I'm least happy about libssh, because we're not using SFTP but we have to pay for it. And the Deb-alikes add librtmp, which I'm not thrilled about either. The rest are, IMO, natural dependencies of a mature HTTP client: the HTTP/1 and HTTP/2 engines, Punycode, the Public Suffix List, UTF handling, and common response compression types. Those are kind of part and parcel of communicating on the web. (If we find an HTTP client that does all those things itself, awesome, but then we have to ask how well they did it.) So one question for the collective is -- putting Curl itself aside -- is having a basic-but-usable OAuth flow, out of the box, worth the costs of a generic HTTP client? A non-trivial footprint *will* be there, whether it's one library or several, whether we delay-load it or not, whether we have the unused SFTP/RTMP dependencies or not. But we could still find ways to reduce that cost for people who aren't using it, if necessary. = Asides = I would also like to point out: End users opt into this by preregistering a client ID with an OAuth issuer ID, then providing that pair of IDs in the connection string. We will not just start crawling the web because a server tells us to. I don't want to downplay the additional risk of having it in the address space, but the design goal is that vulnerabilities in the HTTP logic should not affect users who have not explicitly consented to the use of OAuth. There were some other questions/statements made upthread that I want to clarify too: On Wed, Mar 19, 2025 at 4:11 PM Bruce Momjian <bruce@momjian.us> wrote: > Am I understanding that curl is being used just to honor the RFC and it > is only for testing? No. (I see you found it later, but to state clearly for the record: it's not just for testing.) libcurl is used for the Device Authorization flow implementation. You don't have to use Device Authorization to use OAuth, but we don't provide any alternative flows in-tree; you'd have to use the libpq API to insert your own flow. > I see it now ---- without having RFC 8628 built into the server, (libpq, not the server. We do not ship server-side plugins at all, yet.) > clients > have to implement it. Do we know what percentage would need to do that? For version 1 of the feature, Device Authorization is the only option for our utilities (psql et al). I can't really speculate on percentages; it depends on what percentage want to use OAuth and don't like (or can't use) our builtin flow. Obviously the percentage goes up to 100% if we don't provide one. Plus we lose significant testability, plus no one can use it from psql. > Do we think packagers will use the --with-libcurl configure option? Well, hopefully, yes. The tradeoffs of the builtin flow were chosen explicitly so that existing clients could use it with minimal-to-no code changes. Thanks! --Jacob
pgsql-hackers by date: