Thread: PATCH: warn about, and deprecate, clear text passwords

PATCH: warn about, and deprecate, clear text passwords

From
Greg Sabino Mullane
Date:
There have been a few complaints lately about the fact that we cavalierly allow clear text passwords to be sent when doing CREATE USER or ALTER USER. These, of course, can end up in many places, such as pg_stat_activity, pg_stat_statements, .psql_history, and the server logs. It is a genuinely valid complaint, and for security purposes, there is little recourse other than telling users "don't do that". The canonical recommendation is to use psql's awesome \password feature. Second best is to use your application/driver of choice, which hopefully has support for not sending passwords in the clear.

Please find attached a patch to implement a new GUC called cleartext_passwords_action as an attempt to solve these problems. It is an enum and accepts one of three values:

1. "warn" (the new default)

This issues a warning if a clear text password is used, but allows the change to proceed. The hint can change to recommend \password if the current application_name is 'psql'. By keeping this as a warning, we let people know this is a bad idea, and give people time to modify their applications.

Examples:

ALTER USER alice PASSWORD 'mynewpass';
WARNING:  using a clear text password
DETAIL:  Sending a password using plain text is deprecated and may be removed in a future release of PostgreSQL.
HINT:  Use a client that can change the password without sending it in clear text

ALTER USER eve PASSWORD 'anothernewpass';
WARNING:  using a clear text password
DETAIL:  Sending a password using plain text is deprecated and may be removed in a future release of PostgreSQL.
HINT:  If using psql, you can set the password with \password

2. "allow"
This does nothing, and thus emulates the historical behavior.

3. "disallow"
This prevents the use of plain old text completely, by throwing an error if a password set or change is attempted. So people who want to prevent clear text can do so right away, and at some point we can make this the default (and people can always change to hint or allow if desired)

Bike shedding welcome. I realize the irony that 'disallow' means valid attempts will now show up in the database logs that otherwise would not, but I'm not sure how to work around that (or if we should).

--
Cheers,
Greg

--
Enterprise Postgres Software Products & Tech Support

Attachment

Re: PATCH: warn about, and deprecate, clear text passwords

From
Guillaume Lelarge
Date:
On 21/02/2025 23:33, Greg Sabino Mullane wrote:
> There have been a few complaints lately about the fact that we 
> cavalierly allow clear text passwords to be sent when doing CREATE USER 
> or ALTER USER. These, of course, can end up in many places, such as 
> pg_stat_activity, pg_stat_statements, .psql_history, and the server 
> logs. It is a genuinely valid complaint, and for security purposes, 
> there is little recourse other than telling users "don't do that". The 
> canonical recommendation is to use psql's awesome \password feature. 
> Second best is to use your application/driver of choice, which hopefully 
> has support for not sending passwords in the clear.
> 
> Please find attached a patch to implement a new GUC called 
> cleartext_passwords_action as an attempt to solve these problems. It is 
> an enum and accepts one of three values:
> 
> 1. "warn" (the new default)
> 
> This issues a warning if a clear text password is used, but allows the 
> change to proceed. The hint can change to recommend \password if the 
> current application_name is 'psql'. By keeping this as a warning, we let 
> people know this is a bad idea, and give people time to modify 
> their applications.
> 
> Examples:
> 
> ALTER USER alice PASSWORD 'mynewpass';
> WARNING:  using a clear text password
> DETAIL:  Sending a password using plain text is deprecated and may be 
> removed in a future release of PostgreSQL.
> HINT:  Use a client that can change the password without sending it in 
> clear text
> 
> ALTER USER eve PASSWORD 'anothernewpass';
> WARNING:  using a clear text password
> DETAIL:  Sending a password using plain text is deprecated and may be 
> removed in a future release of PostgreSQL.
> HINT:  If using psql, you can set the password with \password
> 
> 2. "allow"
> This does nothing, and thus emulates the historical behavior.
> 
> 3. "disallow"
> This prevents the use of plain old text completely, by throwing an error 
> if a password set or change is attempted. So people who want to prevent 
> clear text can do so right away, and at some point we can make this the 
> default (and people can always change to hint or allow if desired)
> 
> Bike shedding welcome. I realize the irony that 'disallow' means valid 
> attempts will now show up in the database logs that otherwise would not, 
> but I'm not sure how to work around that (or if we should).
> 

I'm obviously +1 on this patch since I sent kinda the same patch two 
weeks ago 
(https://www.postgresql.org/message-id/8f17493f-0886-406d-8573-0fadcb998b1d%40dalibo.co). 
The only major difference is that your patch can completely disable 
plain text passwords. More options, that sounds better to me.


-- 
Guillaume Lelarge
Consultant
https://dalibo.com



Re: PATCH: warn about, and deprecate, clear text passwords

From
Guillaume Lelarge
Date:
On 22/02/2025 09:07, Guillaume Lelarge wrote:
> On 21/02/2025 23:33, Greg Sabino Mullane wrote:
>> There have been a few complaints lately about the fact that we 
>> cavalierly allow clear text passwords to be sent when doing CREATE 
>> USER or ALTER USER. These, of course, can end up in many places, such 
>> as pg_stat_activity, pg_stat_statements, .psql_history, and the server 
>> logs. It is a genuinely valid complaint, and for security purposes, 
>> there is little recourse other than telling users "don't do that". The 
>> canonical recommendation is to use psql's awesome \password feature. 
>> Second best is to use your application/driver of choice, which 
>> hopefully has support for not sending passwords in the clear.
>>
>> Please find attached a patch to implement a new GUC called 
>> cleartext_passwords_action as an attempt to solve these problems. It 
>> is an enum and accepts one of three values:
>>
>> 1. "warn" (the new default)
>>
>> This issues a warning if a clear text password is used, but allows the 
>> change to proceed. The hint can change to recommend \password if the 
>> current application_name is 'psql'. By keeping this as a warning, we 
>> let people know this is a bad idea, and give people time to modify 
>> their applications.
>>
>> Examples:
>>
>> ALTER USER alice PASSWORD 'mynewpass';
>> WARNING:  using a clear text password
>> DETAIL:  Sending a password using plain text is deprecated and may be 
>> removed in a future release of PostgreSQL.
>> HINT:  Use a client that can change the password without sending it in 
>> clear text
>>
>> ALTER USER eve PASSWORD 'anothernewpass';
>> WARNING:  using a clear text password
>> DETAIL:  Sending a password using plain text is deprecated and may be 
>> removed in a future release of PostgreSQL.
>> HINT:  If using psql, you can set the password with \password
>>
>> 2. "allow"
>> This does nothing, and thus emulates the historical behavior.
>>
>> 3. "disallow"
>> This prevents the use of plain old text completely, by throwing an 
>> error if a password set or change is attempted. So people who want to 
>> prevent clear text can do so right away, and at some point we can make 
>> this the default (and people can always change to hint or allow if 
>> desired)
>>
>> Bike shedding welcome. I realize the irony that 'disallow' means valid 
>> attempts will now show up in the database logs that otherwise would 
>> not, but I'm not sure how to work around that (or if we should).
>>
> 
> I'm obviously +1 on this patch since I sent kinda the same patch two 
> weeks ago (https://www.postgresql.org/message- 
> id/8f17493f-0886-406d-8573-0fadcb998b1d%40dalibo.co). The only major 
> difference is that your patch can completely disable plain text 
> passwords. More options, that sounds better to me.
> 

It applies cleanly, compiles without errors or even warnings.

I did some tests, and I only found one small issue:

set password_encryption to 'md5';
create user u4 password 'md5u1';

WARNING:  using a clear text password
DETAIL:  Sending a password using plain text is deprecated and may be 
removed in a future release of PostgreSQL.
HINT:  If using psql, you can set the password with \password
WARNING:  setting an MD5-encrypted password
DETAIL:  MD5 password support is deprecated and will be removed in a 
future release of PostgreSQL.
HINT:  Refer to the PostgreSQL documentation for details about migrating 
to another password type.
CREATE ROLE

It complains that I'm using a plain text password and a MD5-encrypted 
password. Can't be both. (Probably not an issue with this patch, but 
rather an issue with the commit that implemented MD5-password warnings.)

If I use a real md5 password, it only complains about MD5 encrypted 
password:

create user u5 password 'md58026a39c502750413402a90d9d8bae3c';

WARNING:  setting an MD5-encrypted password
DETAIL:  MD5 password support is deprecated and will be removed in a 
future release of PostgreSQL.
HINT:  Refer to the PostgreSQL documentation for details about migrating 
to another password type.
CREATE ROLE

Other tests were successful.

Thanks Greg!


-- 
Guillaume Lelarge
Consultant
https://dalibo.com



Re: PATCH: warn about, and deprecate, clear text passwords

From
Aleksander Alekseev
Date:
Hi,

> There have been a few complaints lately about the fact that we cavalierly allow clear text passwords to be sent when
doingCREATE USER or ALTER USER. These, of course, can end up in many places, such as pg_stat_activity,
pg_stat_statements,.psql_history, and the server logs. It is a genuinely valid complaint, and for security purposes,
thereis little recourse other than telling users "don't do that". The canonical recommendation is to use psql's awesome
\passwordfeature. Second best is to use your application/driver of choice, which hopefully has support for not sending
passwordsin the clear. 

If the problem is that the password might be logged, wouldn't a proper
solution be not to log such queries?

I don't see how a warning and an extra GUC will improve the overall
security of the system, and I suspect very few users will voluntarily
trade convenience to security by choosing "disallow". So in its
current state the patch doesn't seem to help much.

--
Best regards,
Aleksander Alekseev



Re: PATCH: warn about, and deprecate, clear text passwords

From
Greg Sabino Mullane
Date:
Guillaume Lelarge <guillaume.lelarge@dalibo.com> wrote:

I'm obviously +1 on this patch since I sent kinda the same patch two weeks ago

Ha ha, my brain forgot about that one (even though I commented on it!) - apologies for that.
 
set password_encryption to 'md5';
create user u4 password 'md5u1';
...
It complains that I'm using a plain text password and a MD5-encrypted password. Can't be both. (Probably not an issue with this patch, but rather an issue with the commit that implemented MD5-password warnings.)

This is correct - it can be both. Not only are we sending a password in clear text, but we then encrypt it using MD5. Hence, two warnings.
 
If I use a real md5 password, it only complains about MD5 encrypted password:

Right. If someone sends us something that looks like an already-encrypted password, we just store it. See get_password_type() in backend/libpq/crypt.c. In which case, the actual password that a client would type in would *not* be what was sent over the wire as part of the ALTER USER / CREATE USER, so we don't complain.
 
Cheers,
Greg

--
Enterprise Postgres Software Products & Tech Support

Re: PATCH: warn about, and deprecate, clear text passwords

From
Greg Sabino Mullane
Date:
On Mon, Feb 24, 2025 at 5:07 AM Aleksander Alekseev <aleksander@timescale.com> wrote:
If the problem is that the password might be logged, wouldn't a proper solution be not to log such queries?

Yes, this has been discussed before. The short answer is that it is extremely difficult to implement reliably because we would need to add some artificial intelligence to our parser and/or logger to prevent passwords from being added via syntax errors. Even preventing certain valid commands from being logged is fraught with edge cases and difficult tradeoffs. As mentioned, it's also not just direct logging, it's things like pg_stat_activity and pg_stat_statements.

The real solution is to train people and applications not to send clear text passwords. If the command fails to work, that's a pretty good way to train them.
 
I don't see how a warning and an extra GUC will improve the overall security of the system, and I suspect very few users will voluntarily
trade convenience to security by choosing "disallow". So in its current state the patch doesn't seem to help much.

One of the main goals is to start leading people away from using insecure methods. Like with MD5, first we warn, then we disable usage (but allow a way to enable for stubborn users/applications). So I would say the goals are:

* Provide a warning, so people are aware that sending passwords in the clear is a bad idea. Right now, there is no warning. Quite the improvement.

* Provide a way to disable using clear text passwords. Also a win for people like the OP in another thread that wants to prevent password changes from ending up in the logs. Now they can (and may help with PCI compliance and related things).

* Provide notice to applications/drivers/frameworks that clear text passwords are deprecated and they should provide (or recommend) an alternate method.

* Lay the groundwork for eventually disallowing plain text passwords completely. A long way off, but this is the start. After a couple years, we could switch the default from "warn" to "disallow". A few years after that, disallow completely.

I know it is not a perfect solution, and likely never will be, but we can't let the perfect be the enemy of the good. This seems a good, small incremental step. The three-value solution also allows for complete backwards compatibility, while still allowing admins to throw a warning or error if desired.

Cheers,
Greg

--
Enterprise Postgres Software Products & Tech Support

Re: PATCH: warn about, and deprecate, clear text passwords

From
Guillaume Lelarge
Date:
On 24/02/2025 14:55, Greg Sabino Mullane wrote:
> Guillaume Lelarge <guillaume.lelarge@dalibo.com 
> <mailto:guillaume.lelarge@dalibo.com>> wrote:
> 
>     I'm obviously +1 on this patch since I sent kinda the same patch two
>     weeks ago
> 
> 
> Ha ha, my brain forgot about that one (even though I commented on it!) - 
> apologies for that.
> 

No need to apologize :)

>     set password_encryption to 'md5';
>     create user u4 password 'md5u1';
>     ...
> 
>     It complains that I'm using a plain text password and a MD5-
>     encrypted password. Can't be both. (Probably not an issue with this
>     patch, but rather an issue with the commit that implemented MD5-
>     password warnings.)
> 
> 
> This is correct - it can be both. Not only are we sending a password in 
> clear text, but we then encrypt it using MD5. Hence, two warnings.
> 
>     If I use a real md5 password, it only complains about MD5 encrypted
>     password:
> 
> 
> Right. If someone sends us something that looks like an already- 
> encrypted password, we just store it. See get_password_type() in 
> backend/libpq/crypt.c. In which case, the actual password that a client 
> would type in would *not* be what was sent over the wire as part of the 
> ALTER USER / CREATE USER, so we don't complain.

Sounds good to me.


-- 
Guillaume Lelarge
Consultant
https://dalibo.com



Re: PATCH: warn about, and deprecate, clear text passwords

From
Nathan Bossart
Date:
On Mon, Feb 24, 2025 at 09:26:07AM -0500, Greg Sabino Mullane wrote:
> * Lay the groundwork for eventually disallowing plain text passwords
> completely. A long way off, but this is the start. After a couple years, we
> could switch the default from "warn" to "disallow". A few years after that,
> disallow completely.

I wonder how folks feel about the idea of removing the ability to send
passwords to the server in clear text.  There may be some scenarios where
clear text is probably fine, and most of passwordcheck's checks rely on
being able to see the clear text password, but we've long encouraged folks
to "pre-encrypt" passwords.  I also think it's hard to argue that sending a
clear text password is much more convenient than createuser or \password
(not to mention the PQchangePassword() function in libpq).  That being
said, this seems like it has the potential to break a lot of stuff, and we
probably ought to be cautious about that, too.

This is perhaps a nitpick, but one issue with ERROR-ing for clear text
passwords is that the default logging settings seem to send the statement
to the logs, too.  So, it might actually increase the likelihood of the
password showing up in the logs.  I'm not sure what else could be done, but
I believe the conventional wisdom is that logs can contain sensitive
information, so maybe it's okay...  It still seems weird to me to try to
help folks to avoid logging passwords by logging their passwords.

-- 
nathan



Re: PATCH: warn about, and deprecate, clear text passwords

From
Isaac Morland
Date:
On Mon, 24 Feb 2025 at 15:47, Nathan Bossart <nathandbossart@gmail.com> wrote:

This is perhaps a nitpick, but one issue with ERROR-ing for clear text
passwords is that the default logging settings seem to send the statement
to the logs, too.  So, it might actually increase the likelihood of the
password showing up in the logs.  I'm not sure what else could be done, but
I believe the conventional wisdom is that logs can contain sensitive
information, so maybe it's okay...  It still seems weird to me to try to
help folks to avoid logging passwords by logging their passwords.

It is definitely ironic, but it’s non-routinely logging their proposed new password which, due to the server settings, does not actually get set as the new password, in order to prevent routinely logging their passwords.

What I mean is, after the error is thrown and the proposed password logged, they need to re-try with a pre-encrypted password which will not be logged. If they choose a new password, then the logged one is irrelevant, and even if they don't, it's just one password rather than all the ones they change. So on the whole I think this is good. And in any case I believe the existing behaviour can still be had by configuration so we're not really imposing anything on anybody.

Re: PATCH: warn about, and deprecate, clear text passwords

From
Nathan Bossart
Date:
On Mon, Feb 24, 2025 at 04:06:41PM -0500, Isaac Morland wrote:
> And in any case I believe the existing behaviour can still be had by
> configuration so we're not really imposing anything on anybody.

Well, the discussion upthread suggests "disallowing plain text passwords
completely" [0], which means at some point we would have to impose
something, right?  Again, maybe this in itself is not a deal-breaker.
After all, we'll probably have a similar problem when we eventually remove
MD5 password support down the road.

[0] https://postgr.es/m/CAKAnmmKGWxEGbvuBAxyDWmuije8agUHTY-82DR1VEkFM2vKNTg%40mail.gmail.com

-- 
nathan



Re: PATCH: warn about, and deprecate, clear text passwords

From
Greg Sabino Mullane
Date:
On Mon, Feb 24, 2025 at 4:18 PM Nathan Bossart <nathandbossart@gmail.com> wrote:
Well, the discussion upthread suggests "disallowing plain text passwords completely"

Yeah, that's more of a long-term dream than a real plan. It would certainly be no sooner than Postgres v24 or so...

Cheers,
Greg

--
Enterprise Postgres Software Products & Tech Support

Re: PATCH: warn about, and deprecate, clear text passwords

From
Nathan Bossart
Date:
On Mon, Feb 24, 2025 at 04:20:44PM -0500, Greg Sabino Mullane wrote:
> On Mon, Feb 24, 2025 at 4:18 PM Nathan Bossart <nathandbossart@gmail.com>
> wrote:
>> Well, the discussion upthread suggests "disallowing plain text passwords
>> completely"
> 
> Yeah, that's more of a long-term dream than a real plan. It would certainly
> be no sooner than Postgres v24 or so...

I noticed a nearby thread [0] in which there appears to be some budding
support for a GUC that disables sending passwords to the server in
clear-text, at least for CREATE/ALTER ROLE.  Perhaps we just add that for
now.  (I'm probably well over my quota for new GUCs in v18...)

IMHO a WARNING would really only be appropriate if we are definitely going
to remove support in the future, and that feels like a bit of a stretch to
me due to the level of breakage it could cause.  That being said, folks did
seem on board enough with deprecating MD5 passwords for me to feel
comfortable committing it, although that might not quite be an
apples-to-apples comparison.  In any case, we've long encouraged folks to
avoid sending passwords to the server in clear-text, so I think it's
reasonable to provide some way to enforce that server-side.

[0] https://postgr.es/m/3136308.1740155121%40sss.pgh.pa.us

-- 
nathan



Re: PATCH: warn about, and deprecate, clear text passwords

From
Greg Sabino Mullane
Date:
On Tue, Feb 25, 2025 at 10:34 AM Nathan Bossart <nathandbossart@gmail.com> wrote:
I noticed a nearby thread [0] in which there appears to be some budding support for a GUC that disables sending passwords to the server in clear-text, at least for CREATE/ALTER ROLE.

Yep, that was the thread that inspired this patch!

Perhaps we just add that for now.  (I'm probably well over my quota for new GUCs in v18...)

Heh.
 
IMHO a WARNING would really only be appropriate if we are definitely going to remove support in the future, and that feels like a bit of a stretch to me due to the level of breakage it could cause.  That being said, folks did seem on board enough with deprecating MD5 passwords for me to feel comfortable committing it, although that might not quite be an apples-to-apples comparison.  In any case, we've long encouraged folks to avoid sending passwords to the server in clear-text, so I think it's reasonable to provide some way to enforce that server-side.

Yes, I went back and forth on the wording for the warning, but ended up with a slightly weasely "may be removed" rather than "will be removed". Of course, no date is explicitly promised, so "will be removed" could be an accurate. It might just be 75 years from now, when our neural implants make plain text passwords a quaint relic.

This has a commitfest entry now fwiw: https://commitfest.postgresql.org/patch/5597/

Thank you for your input on this.


Cheers,
Greg

--
Enterprise Postgres Software Products & Tech Support

Re: PATCH: warn about, and deprecate, clear text passwords

From
Nathan Bossart
Date:
On Tue, Feb 25, 2025 at 11:13:51AM -0500, Greg Sabino Mullane wrote:
> On Tue, Feb 25, 2025 at 10:34 AM Nathan Bossart <nathandbossart@gmail.com>
> wrote:
>> IMHO a WARNING would really only be appropriate if we are definitely going
>> to remove support in the future, and that feels like a bit of a stretch to
>> me due to the level of breakage it could cause.  That being said, folks did
>> seem on board enough with deprecating MD5 passwords for me to feel
>> comfortable committing it, although that might not quite be an
>> apples-to-apples comparison.  In any case, we've long encouraged folks to
>> avoid sending passwords to the server in clear-text, so I think it's
>> reasonable to provide some way to enforce that server-side.
> 
> Yes, I went back and forth on the wording for the warning, but ended up
> with a slightly weasely "may be removed" rather than "will be removed". Of
> course, no date is explicitly promised, so "will be removed" could be an
> accurate. It might just be 75 years from now, when our neural implants make
> plain text passwords a quaint relic.

I think it would be good to hear some other opinions on whether we should
consider sending clear-text passwords to the server as either 1) fully
supported, 2) deprecated but with no intent to remove anytime soon, or 3)
deprecated with the intent of removal at some point in the next several
years.  I personally am -1 on the warning unless we have a consensus on
(3), but I'm +1 on adding a way to enforce "pre-encryption" regardless.

-- 
nathan



Re: PATCH: warn about, and deprecate, clear text passwords

From
Greg Sabino Mullane
Date:
On Mon, Mar 3, 2025 at 11:33 AM Nathan Bossart <nathandbossart@gmail.com> wrote:
I think it would be good to hear some other opinions on whether we should consider sending clear-text passwords to the server as either 1) fully supported, 2) deprecated but with no intent to remove anytime soon, or 3) deprecated with the intent of removal at some point in the next several years.  I personally am -1 on the warning unless we have a consensus on (3), but I'm +1 on adding a way to enforce "pre-encryption" regardless.

That's more than fair. And "deprecation" doesn't need to mean that's the next step in the process. So warn -> deny by default (but allow if you work at it) -> remove completely. Which is very similar to our md5 path, I suppose. I'm certainly happy staying at that middle stage for an indefinite amount of time for both of those, as it means that Postgres is both "secure by default" but backwards compatible.
 
--
Cheers,
Greg

--
Enterprise Postgres Software Products & Tech Support

Re: PATCH: warn about, and deprecate, clear text passwords

From
Isaac Morland
Date:
On Mon, 3 Mar 2025 at 12:07, Greg Sabino Mullane <htamfids@gmail.com> wrote:
On Mon, Mar 3, 2025 at 11:33 AM Nathan Bossart <nathandbossart@gmail.com> wrote:
I think it would be good to hear some other opinions on whether we should consider sending clear-text passwords to the server as either 1) fully supported, 2) deprecated but with no intent to remove anytime soon, or 3) deprecated with the intent of removal at some point in the next several years.  I personally am -1 on the warning unless we have a consensus on (3), but I'm +1 on adding a way to enforce "pre-encryption" regardless.

That's more than fair. And "deprecation" doesn't need to mean that's the next step in the process. So warn -> deny by default (but allow if you work at it) -> remove completely. Which is very similar to our md5 path, I suppose. I'm certainly happy staying at that middle stage for an indefinite amount of time for both of those, as it means that Postgres is both "secure by default" but backwards compatible.

It's too bad we didn't have this discussion a few years ago. We could have decided that SCRAM authentication doesn't allow sending cleartext passwords and then relied on the phase-out of MD5 passwords to phase out sending of cleartext passwords. 

Re: PATCH: warn about, and deprecate, clear text passwords

From
Robert Haas
Date:
On Mon, Mar 3, 2025 at 11:33 AM Nathan Bossart <nathandbossart@gmail.com> wrote:
> I think it would be good to hear some other opinions on whether we should
> consider sending clear-text passwords to the server as either 1) fully
> supported, 2) deprecated but with no intent to remove anytime soon, or 3)
> deprecated with the intent of removal at some point in the next several
> years.  I personally am -1 on the warning unless we have a consensus on
> (3), but I'm +1 on adding a way to enforce "pre-encryption" regardless.

I wonder if we could drum up some support for not including any
version of the password (even encrypted) in the query string. For
instance, let's say that to change your password you have to use the
new CHANGE PASSWORD command which can only be used at top level (not
inside PL code or whatever) and always takes a single parameter that
must be supplied via the extended query protocol. I suppose there's
still a potential security exposure if people are logging parameters,
but maybe it's easier to avoid logging those parameters when the
command is CHANGE PASSWORD than it is to avoid logging a query string
with sensitive information in it.

If we introduced such a mechanism, perhaps we could eventually
deprecate ALTER USER as a method of changing passwords, or at least
have the option to disallow it. Or maybe we just want to add the
option to disallow it now, as proposed here -- but I'm not totally
convinced that will meaningfully improve security if the command still
exists and might still work on some systems.

--
Robert Haas
EDB: http://www.enterprisedb.com



Re: PATCH: warn about, and deprecate, clear text passwords

From
Tom Lane
Date:
Robert Haas <robertmhaas@gmail.com> writes:
> I wonder if we could drum up some support for not including any
> version of the password (even encrypted) in the query string. For
> instance, let's say that to change your password you have to use the
> new CHANGE PASSWORD command which can only be used at top level (not
> inside PL code or whatever) and always takes a single parameter that
> must be supplied via the extended query protocol.

How would pg_dumpall cope with transferring passwords then?

I could see insisting that plain-text passwords be supplied only
that way.  But removing the ability to have encrypted passwords
in-line seems like a serious operational problem with little benefit.

            regards, tom lane



Re: PATCH: warn about, and deprecate, clear text passwords

From
Robert Haas
Date:
On Mon, Mar 3, 2025 at 1:47 PM Tom Lane <tgl@sss.pgh.pa.us> wrote:
> Robert Haas <robertmhaas@gmail.com> writes:
> > I wonder if we could drum up some support for not including any
> > version of the password (even encrypted) in the query string. For
> > instance, let's say that to change your password you have to use the
> > new CHANGE PASSWORD command which can only be used at top level (not
> > inside PL code or whatever) and always takes a single parameter that
> > must be supplied via the extended query protocol.
>
> How would pg_dumpall cope with transferring passwords then?
>
> I could see insisting that plain-text passwords be supplied only
> that way.  But removing the ability to have encrypted passwords
> in-line seems like a serious operational problem with little benefit.

Oh, good point. I don't know. I just have heard a LOT of complaining
about passwords showing up in the log, and I'm not sure insisting that
they have to all be encrypted is going to make all of the complaining
stop.

--
Robert Haas
EDB: http://www.enterprisedb.com



Re: PATCH: warn about, and deprecate, clear text passwords

From
Nathan Bossart
Date:
On Mon, Mar 03, 2025 at 01:54:59PM -0500, Robert Haas wrote:
> Oh, good point. I don't know. I just have heard a LOT of complaining
> about passwords showing up in the log, and I'm not sure insisting that
> they have to all be encrypted is going to make all of the complaining
> stop.

+1.  At this point, IMHO we should consider this v19 material to provide
more time for discussion on the best way to tackle this problem.  Blocking
plain-text passwords in CREATE/ALTER ROLE commands may be part of it, but
as Robert notes, we might need to do more.

-- 
nathan



Re: PATCH: warn about, and deprecate, clear text passwords

From
Greg Sabino Mullane
Date:
I'd rather not sit on this another year, if we can help it. We really should be warning people about this practice. The exact wording of the hint can be up for debate (or postponed - we technically don't have to say anything other than 'bad idea').

Having the ability to disable clear text passwords seems an immediate win for those that want to enable it. Sure, we could be doing more, but I don't see any of the proposed future changes interfering with this patch.

Cheers,
Greg

--
Enterprise Postgres Software Products & Tech Support

Re: PATCH: warn about, and deprecate, clear text passwords

From
Roberto Mello
Date:
On Fri, Mar 14, 2025 at 12:50 PM Greg Sabino Mullane <htamfids@gmail.com> wrote:
I'd rather not sit on this another year, if we can help it. We really should be warning people about this practice. The exact wording of the hint can be up for debate (or postponed - we technically don't have to say anything other than 'bad idea').

Having the ability to disable clear text passwords seems an immediate win for those that want to enable it. Sure, we could be doing more, but I don't see any of the proposed future changes interfering with this patch.

I agree. This is a clear win that can easily be turned on by packagers/distributors with little consequence to everyone else.

My only suggestion would be to have the GUC name be closer to other password-related settings. Looking at the sample file I see

password_encryption
md5_password_warnings

So perhaps something like password_cleartext_action  would fit in a little better and make it easier to spot while going through the file.

Roberto

Re: PATCH: warn about, and deprecate, clear text passwords

From
Robert Haas
Date:
On Fri, Mar 14, 2025 at 2:50 PM Greg Sabino Mullane <htamfids@gmail.com> wrote:
> I'd rather not sit on this another year, if we can help it. We really should be warning people about this practice.
Theexact wording of the hint can be up for debate (or postponed - we technically don't have to say anything other than
'badidea'). 
>
> Having the ability to disable clear text passwords seems an immediate win for those that want to enable it. Sure, we
couldbe doing more, but I don't see any of the proposed future changes interfering with this patch. 

I don't know, I think Nathan's idea of giving ourselves more time to
decide what to do is a pretty good one. It seems clear from the
discussion so far that there are multiple ideas about what to do here,
and it's not stupid to want to give ourselves a bit of time to think
that through before committing to anything in particular. From my
point of view, the warning text here for what is proposed here almost
might almost be:

WARNING: you just caused a problem for somebody else

The user has no particular reason to care about the fact that the
password they just typed ended up in the log. That is a concern for
the DBA, not the user, and even if they care about the DBA's feelings,
they only get the warning after it's too late to do otherwise.
Blocking ALTER USER commands containing such passwords is better,
because now doing the wrong thing actually doesn't work at all, and so
they have to change their behavior if they want to get anything done.
But we don't seem to be too sure whether we can really get away with
that amount of breakage; and we also don't seem to be sure whether it
really solves the problem; and we're getting very close to feature
freeze.

--
Robert Haas
EDB: http://www.enterprisedb.com



PATCH: warn about, and deprecate, clear text passwords

From
"David G. Johnston"
Date:
On Sunday, March 16, 2025, Robert Haas <robertmhaas@gmail.com> wrote:

WARNING: you just caused a problem for somebody else

The user has no particular reason to care about the fact that the
password they just typed ended up in the log.

It could also be:

warning: your password is known to Big Brother
hint: use psql \password to supply a private password, or see “docs/wiki page” for more details and a way to pre-compute and send a private password via SQL.

Sure, we can’t make them drink, but let’s at least show them where we put the water trough.  Some of them will care but be unaware.

We can make it an error later and do nothing, removing the choice but to figure out the proper way of changing their password.

David J.

Re: PATCH: warn about, and deprecate, clear text passwords

From
Robert Haas
Date:
On Sun, Mar 16, 2025 at 11:36 PM David G. Johnston
<david.g.johnston@gmail.com> wrote:
> It could also be:
>
> warning: your password is known to Big Brother
> hint: use psql \password to supply a private password, or see “docs/wiki page” for more details and a way to
pre-computeand send a private password via SQL. 

OK, that's actually a fair point. It's still true, though, that all
the complaints that I hear about this are of the form "someone MIGHT
do something that puts their password in a log file" and a warning
doesn't stop that.

Granted, other people may hear different complaints than I do.

--
Robert Haas
EDB: http://www.enterprisedb.com



Re: PATCH: warn about, and deprecate, clear text passwords

From
Greg Sabino Mullane
Date:
The user has no particular reason to care about the fact that the password they just typed ended up in the log. That is a concern for
the DBA, not the user, and even if they care about the DBA's feelings, they only get the warning after it's too late to do otherwise.

Can't the same be said about other warnings, esp. md5?

Attached is a rebase of the patch. 

I'm a little confused at some of the pushback - this patch is 100% backwards compatible, addresses a specific requested concern by allowing a DBA to disallow clear text passwords, and adds a warning to what is clearly a bad practice that we should be discouraging.

Robert - would you be more inclined to accept this if we kept the three states, but made the default "allow"? That would still allow people to bump it stronger manually, but would have no effect on everyone else. That would give us time to tweak the wording and/or examine other approaches. Although any other approaches would still leave the need to do something with passwords via ALTER USER / CREATE USER in the interim.

Cheers,
Greg

--
Enterprise Postgres Software Products & Tech Support

Attachment

Re: PATCH: warn about, and deprecate, clear text passwords

From
Bruce Momjian
Date:
On Wed, Mar 19, 2025 at 09:24:19AM -0400, Greg Sabino Mullane wrote:
> I'm a little confused at some of the pushback - this patch is 100% backwards
> compatible, addresses a specific requested concern by allowing a DBA to
> disallow clear text passwords, and adds a warning to what is clearly a bad
> practice that we should be discouraging.
> 
> Robert - would you be more inclined to accept this if we kept the three states,
> but made the default "allow"? That would still allow people to bump it stronger
> manually, but would have no effect on everyone else. That would give us time to
> tweak the wording and/or examine other approaches. Although any other
> approaches would still leave the need to do something with passwords via ALTER
> USER / CREATE USER in the interim.

You are getting pushback because this complex user change is still being
debated in mid-March, when the feature freeze is only a few weeks away.

-- 
  Bruce Momjian  <bruce@momjian.us>        https://momjian.us
  EDB                                      https://enterprisedb.com

  Do not let urgent matters crowd out time for investment in the future.



Re: PATCH: warn about, and deprecate, clear text passwords

From
Robert Haas
Date:
On Wed, Mar 19, 2025 at 9:24 AM Greg Sabino Mullane <htamfids@gmail.com> wrote:
>> The user has no particular reason to care about the fact that the password they just typed ended up in the log. That
isa concern for 
>> the DBA, not the user, and even if they care about the DBA's feelings, they only get the warning after it's too late
todo otherwise. 
>
> Can't the same be said about other warnings, esp. md5?

Absolutely. Warnings are sometimes the right thing, but they often
suck. If something is really a bad idea, "ERROR: bad idea" is vastly
superior to "WARNING: what you just already did was a bad idea". If we
don't actually know for sure that it's a bad idea, then it's generally
better not to emit a warning at all, for fear of log-spamming people
who know what they're doing.

> Robert - would you be more inclined to accept this if we kept the three states, but made the default "allow"? That
wouldstill allow people to bump it stronger manually, but would have no effect on everyone else. That would give us
timeto tweak the wording and/or examine other approaches. Although any other approaches would still leave the need to
dosomething with passwords via ALTER USER / CREATE USER in the interim. 

I mean, I do think that is probably a better idea, but I personally
have zero intention of committing this patch regardless. I have seen a
lot of problems in this area working at EDB and my educated guess is
that this solves 0% of them. Now, if enough other people show up to
say "but this would solve 100% of my problems," well then fair enough.
But I think it's entirely reasonable for me to look at the combination
of "this is a class of problem that affects me" and "this proposed
solution would not help me" and be skeptical. I think you'd feel the
same if the situation were reversed. If I came along and proposed some
solution to a PG problem and you agreed that the problem was a problem
but my proposed solution seemed useless, I assume you'd also -1 that
patch.

--
Robert Haas
EDB: http://www.enterprisedb.com



Re: PATCH: warn about, and deprecate, clear text passwords

From
Nathan Bossart
Date:
On Wed, Mar 19, 2025 at 10:06:58AM -0400, Robert Haas wrote:
> On Wed, Mar 19, 2025 at 9:24 AM Greg Sabino Mullane <htamfids@gmail.com> wrote:
>>> The user has no particular reason to care about the fact that the
>>> password they just typed ended up in the log. That is a concern for the
>>> DBA, not the user, and even if they care about the DBA's feelings, they
>>> only get the warning after it's too late to do otherwise.
>>
>> Can't the same be said about other warnings, esp. md5?
> 
> Absolutely. Warnings are sometimes the right thing, but they often
> suck. If something is really a bad idea, "ERROR: bad idea" is vastly
> superior to "WARNING: what you just already did was a bad idea". If we
> don't actually know for sure that it's a bad idea, then it's generally
> better not to emit a warning at all, for fear of log-spamming people
> who know what they're doing.

FWIW I primarily intended the MD5 password warning to alert folks that the
ability to use MD5 passwords will go away at some point in the future.  If
they want to continue to use MD5 passwords for now, they are free to do so.
They can even turn off the warnings.  One of the main reasons I'm not
totally sold on a clear-text password warning is because we don't have
agreement on removing that ability anytime soon, not to mention Bruce's
point about the debate extending into mid-March.

-- 
nathan