Thread: Postgres Enhancement Request

Postgres Enhancement Request

From
"Zwettler Markus (OIZ)"
Date:
CREATEROLE allows users to create new roles also having the CREATEDB privilege (at least in version 9.6).

We want special users to be able to CREATEROLE without being able to CREATEDB (eg. when usermanagement is done by the
applicationitself).
 

Please prevent users with CREATEROLE to create roles having CREATEDB (analogous SUPERUSER and REPLICATION).

Thanks


Re: Postgres Enhancement Request

From
Thomas Kellerer
Date:
Zwettler Markus (OIZ) schrieb am 20.03.2019 um 11:10:
> CREATEROLE allows users to create new roles also having the CREATEDB privilege (at least in version 9.6).
> 
> We want special users to be able to CREATEROLE without being able to CREATEDB (eg. when usermanagement is done by the
applicationitself).
 
> 
> Please prevent users with CREATEROLE to create roles having CREATEDB (analogous SUPERUSER and REPLICATION).

I agree that would be a welcome enhancement. 

As a workaround, you can create a function owned by a superuser (or any other user with the "createrole" privilege)
using"security definer" that provides a simple "create user" capability and makes sure that the created user does not
havethe createdb privilege. 
 

The user/role that should be able to create new roles doesn't need the createrole privilege at all then. 
All it needs is the execute privilege on the function.

Thomas




AW: Postgres Enhancement Request

From
"Zwettler Markus (OIZ)"
Date:
We already did and use this at the moment. Unfortunately.

Some out-of-the-box applications can't use functions for user management.
Some users don't want "special" functions for user management.
...

Markus



-----Ursprüngliche Nachricht-----
Von: Thomas Kellerer <spam_eater@gmx.net> 
Gesendet: Mittwoch, 20. März 2019 11:45
An: pgsql-general@lists.postgresql.org
Betreff: Re: Postgres Enhancement Request

Zwettler Markus (OIZ) schrieb am 20.03.2019 um 11:10:
> CREATEROLE allows users to create new roles also having the CREATEDB privilege (at least in version 9.6).
> 
> We want special users to be able to CREATEROLE without being able to CREATEDB (eg. when usermanagement is done by the
applicationitself).
 
> 
> Please prevent users with CREATEROLE to create roles having CREATEDB (analogous SUPERUSER and REPLICATION).

I agree that would be a welcome enhancement. 

As a workaround, you can create a function owned by a superuser (or any other user with the "createrole" privilege)
using"security definer" that provides a simple "create user" capability and makes sure that the created user does not
havethe createdb privilege. 
 

The user/role that should be able to create new roles doesn't need the createrole privilege at all then. 
All it needs is the execute privilege on the function.

Thomas




Re: Postgres Enhancement Request

From
Tom Lane
Date:
Thomas Kellerer <spam_eater@gmx.net> writes:
> Zwettler Markus (OIZ) schrieb am 20.03.2019 um 11:10:
>> Please prevent users with CREATEROLE to create roles having CREATEDB (analogous SUPERUSER and REPLICATION).

> I agree that would be a welcome enhancement.

No, it wouldn't.  The point of CREATEROLE is to allow user creation
and deletion to be done by a role that's less than full superuser.
If we changed it like that, then you'd be right back at needing
superuser for very routine role creations.  That's *not* an
improvement, even if it somehow fit better into the OP's desired
security model (which he hasn't explained).

            regards, tom lane


Re: Postgres Enhancement Request

From
Thomas Kellerer
Date:
Tom Lane schrieb am 20.03.2019 um 14:59:
>>> Please prevent users with CREATEROLE to create roles having CREATEDB (analogous SUPERUSER and REPLICATION).
> 
>> I agree that would be a welcome enhancement. 
> 
> No, it wouldn't.  The point of CREATEROLE is to allow user creation
> and deletion to be done by a role that's less than full superuser.
> If we changed it like that, then you'd be right back at needing
> superuser for very routine role creations.  That's *not* an
> improvement, even if it somehow fit better into the OP's desired
> security model (which he hasn't explained).

I didn't take this to be a request to remove the createdb privilege in general, but a request to have finer grained
controlwhat kind of privileges the role with createrole can grant to newly created roles (or what it can do in
general).

Maybe if "createrole" was a regular privilege (like "create table"), then something like this would be possible:

    create role user_admin;
    grant create role to user_admin;

Thomas


Re: Postgres Enhancement Request

From
Tom Lane
Date:
Thomas Kellerer <spam_eater@gmx.net> writes:
> Tom Lane schrieb am 20.03.2019 um 14:59:
>> No, it wouldn't.  The point of CREATEROLE is to allow user creation
>> and deletion to be done by a role that's less than full superuser.
>> If we changed it like that, then you'd be right back at needing
>> superuser for very routine role creations.  That's *not* an
>> improvement, even if it somehow fit better into the OP's desired
>> security model (which he hasn't explained).

> I didn't take this to be a request to remove the createdb privilege in general, but a request to have finer grained
controlwhat kind of privileges the role with createrole can grant to newly created roles (or what it can do in
general).

Hmm.  Thinking about it a bit more carefully, it does seem bogus that
a role that has CREATEROLE but not CREATEDB can make a role that has
the latter privilege.  It would be more sensible to have a uniform
rule that "you can't grant a privilege you don't have yourself",
which would mean that the OP's problem could perhaps be solved by
making a role that has CREATEROLE but not CREATEDB.

You could imagine going further and applying the full SQL privilege
model to these things, which would make it possible to have a role
that has CREATEDB (so can make DBs itself) but can't pass that
privilege on to others for lack of grant options on CREATEDB.
But that would be a very much bigger chunk of work, and I'm not sure
I see the payback.

            regards, tom lane


AW: Postgres Enhancement Request

From
"Zwettler Markus (OIZ)"
Date:
Yes, that would be totally ok. Like the "with [grant|admin] option" privilege model in SQL. It should be done with all
thesepredefined top-level database roles like CREATEROLE. 

It's doesn't only seem bogus but also a security hole when users can get privileges they have never been granted.

Markus




-----Ursprüngliche Nachricht-----
Von: Tom Lane <tgl@sss.pgh.pa.us>
Gesendet: Mittwoch, 20. März 2019 15:30
An: Thomas Kellerer <spam_eater@gmx.net>
Cc: pgsql-general@lists.postgresql.org
Betreff: Re: Postgres Enhancement Request

Thomas Kellerer <spam_eater@gmx.net> writes:
> Tom Lane schrieb am 20.03.2019 um 14:59:
>> No, it wouldn't.  The point of CREATEROLE is to allow user creation
>> and deletion to be done by a role that's less than full superuser.
>> If we changed it like that, then you'd be right back at needing
>> superuser for very routine role creations.  That's *not* an
>> improvement, even if it somehow fit better into the OP's desired
>> security model (which he hasn't explained).

> I didn't take this to be a request to remove the createdb privilege in general, but a request to have finer grained
controlwhat kind of privileges the role with createrole can grant to newly created roles (or what it can do in
general).

Hmm.  Thinking about it a bit more carefully, it does seem bogus that a role that has CREATEROLE but not CREATEDB can
makea role that has the latter privilege.  It would be more sensible to have a uniform rule that "you can't grant a
privilegeyou don't have yourself", which would mean that the OP's problem could perhaps be solved by making a role that
hasCREATEROLE but not CREATEDB. 

You could imagine going further and applying the full SQL privilege model to these things, which would make it possible
tohave a role that has CREATEDB (so can make DBs itself) but can't pass that privilege on to others for lack of grant
optionson CREATEDB. 
But that would be a very much bigger chunk of work, and I'm not sure I see the payback.

            regards, tom lane



Re: AW: Postgres Enhancement Request

From
Gavin Flower
Date:
Hi Markus,

Please see comment at the bottonm of this email!

On 21/03/2019 05:36, Zwettler Markus (OIZ) wrote:
> Yes, that would be totally ok. Like the "with [grant|admin] option" privilege model in SQL. It should be done with
allthese predefined top-level database roles like CREATEROLE.
 
>
> It's doesn't only seem bogus but also a security hole when users can get privileges they have never been granted.
>
> Markus
>
>
[...]

A way of indicating content has been omitted!

In ancient times, early 1990's  '[ omitted ]' was used, but I started 
the trend of using '[...]'.

> Hmm.  Thinking about it a bit more carefully, it does seem bogus that a role that has CREATEROLE but not CREATEDB can
makea role that has the latter privilege.  It would be more sensible to have a uniform rule that "you can't grant a
privilegeyou don't have yourself", which would mean that the OP's problem could perhaps be solved by making a role that
hasCREATEROLE but not CREATEDB.
 
>
> You could imagine going further and applying the full SQL privilege model to these things, which would make it
possibleto have a role that has CREATEDB (so can make DBs itself) but can't pass that privilege on to others for lack
ofgrant options on CREATEDB.
 
> But that would be a very much bigger chunk of work, and I'm not sure I see the payback.
>
>             regards, tom lane
>
>
In the postgres groups, please bottom post, as that is the convention here.

Bottom posting makes it easier to follow what is happening.

You can also intersperse comments an omit chunks that are no longer 
relevant.


Thanks,
Gavin