Feature idea

Started by Chris Ochsalmost 22 years ago8 messagesgeneral
Jump to latest
#1Chris Ochs
chris@paymentonline.com

What if SET SESSION AUTHORIZATION could also accept a password so that non
superusers could switch to a different user? How difficult would this be?

One nice side benefit to this would be that you could effectively connect as
many users with Apache::DBI under mod perl without having an open connection
for every user.

Chris

#2Bruce Momjian
bruce@momjian.us
In reply to: Chris Ochs (#1)
Re: Feature idea

Chris Ochs wrote:

What if SET SESSION AUTHORIZATION could also accept a password so that non
superusers could switch to a different user? How difficult would this be?

Well, the password would go over the wire unencrypted, causing a
security problem.

-- 
  Bruce Momjian                        |  http://candle.pha.pa.us
  pgman@candle.pha.pa.us               |  (610) 359-1001
  +  If your life is a hard drive,     |  13 Roberts Road
  +  Christ can be your backup.        |  Newtown Square, Pennsylvania 19073
#3Bill Moran
wmoran@potentialtech.com
In reply to: Bruce Momjian (#2)
Re: Feature idea

Bruce Momjian <pgman@candle.pha.pa.us> wrote:

Chris Ochs wrote:

What if SET SESSION AUTHORIZATION could also accept a password so that non
superusers could switch to a different user? How difficult would this be?

Well, the password would go over the wire unencrypted, causing a
security problem.

Only if encrypted transport is not enabled. With encrypted transport, it would
be as secure as anything else, right?

Perhaps, it could only be available if transmission encryption is enabled? Then
again, there's a certain amount of "only the user can shoot his own foot" that
has to be accepted ...

Just thinking out loud ...

--
Bill Moran
Potential Technologies
http://www.potentialtech.com

#4Chris Ochs
chris@paymentonline.com
In reply to: Chris Ochs (#1)
Re: Feature idea

As much as I hate to say it, if it would be insecure when not using ssl,
this is a feature that people would definitely use insecurely and one day it
would be labeled as a 'security hole' in postgresql.

Chris
----- Original Message -----
From: "Bill Moran" <wmoran@potentialtech.com>
To: "Bruce Momjian" <pgman@candle.pha.pa.us>
Cc: <chris@paymentonline.com>; <pgsql-general@postgresql.org>
Sent: Tuesday, June 15, 2004 8:13 AM
Subject: Re: [GENERAL] Feature idea

Bruce Momjian <pgman@candle.pha.pa.us> wrote:

Chris Ochs wrote:

What if SET SESSION AUTHORIZATION could also accept a password so that

non

superusers could switch to a different user? How difficult would this

be?

Well, the password would go over the wire unencrypted, causing a
security problem.

Only if encrypted transport is not enabled. With encrypted transport, it

would

be as secure as anything else, right?

Perhaps, it could only be available if transmission encryption is enabled?

Then

again, there's a certain amount of "only the user can shoot his own foot"

that

Show quoted text

has to be accepted ...

Just thinking out loud ...

--
Bill Moran
Potential Technologies
http://www.potentialtech.com

#5Bruce Momjian
bruce@momjian.us
In reply to: Bill Moran (#3)
Re: Feature idea

Bill Moran wrote:

Bruce Momjian <pgman@candle.pha.pa.us> wrote:

Chris Ochs wrote:

What if SET SESSION AUTHORIZATION could also accept a password so that non
superusers could switch to a different user? How difficult would this be?

Well, the password would go over the wire unencrypted, causing a
security problem.

Only if encrypted transport is not enabled. With encrypted transport, it would
be as secure as anything else, right?

Perhaps, it could only be available if transmission encryption is enabled? Then
again, there's a certain amount of "only the user can shoot his own foot" that
has to be accepted ...

Just thinking out loud ...

Yes, if you use SSH it is secure, but do we want clauses that are only
useful in SSH mode?

-- 
  Bruce Momjian                        |  http://candle.pha.pa.us
  pgman@candle.pha.pa.us               |  (610) 359-1001
  +  If your life is a hard drive,     |  13 Roberts Road
  +  Christ can be your backup.        |  Newtown Square, Pennsylvania 19073
#6Bill Moran
wmoran@potentialtech.com
In reply to: Bruce Momjian (#5)
Re: Feature idea

Bruce Momjian <pgman@candle.pha.pa.us> wrote:

Bill Moran wrote:

Bruce Momjian <pgman@candle.pha.pa.us> wrote:

Chris Ochs wrote:

What if SET SESSION AUTHORIZATION could also accept a password so that non
superusers could switch to a different user? How difficult would this be?

Well, the password would go over the wire unencrypted, causing a
security problem.

Only if encrypted transport is not enabled. With encrypted transport, it would
be as secure as anything else, right?

Perhaps, it could only be available if transmission encryption is enabled? Then
again, there's a certain amount of "only the user can shoot his own foot" that
has to be accepted ...

Just thinking out loud ...

Yes, if you use SSH it is secure, but do we want clauses that are only
useful in SSH mode?

Not to start an argument, but you could reverse that logic and say "Do you want
to hurt the smart, ssl users by not including helpful functionality that could
be dangerous to uneducated non-ssl users?"

IMHO, it really depends on the design philosophy that PostgreSQL follows. I'm
familiar with the strong push for stability, and I approve. But I'm not as
sure I have a feel for what developers think about this kind of thing.

If you made it a compile-time option, or made it disabled by default and
requires a special setting in postgresql.conf to enable. Would that be secure?
Not really, as stupid users would still enable it without understanding, and
there's always the possibility that a some packager would build it with
dangerous settings and distribute it widely.

(As a side note, I seem to remember a program that had a --shoot-my-own-foot
option to ./configure ... but I can't remember what it was ...)

So, the question becomes one of design philosophy (at least, I'm basing this on
the concept that actual implementation would not be too hard, correct me if I'm
wrong)

--
Bill Moran
Potential Technologies
http://www.potentialtech.com

#7Bruce Momjian
bruce@momjian.us
In reply to: Bill Moran (#6)
Re: Feature idea

Bill Moran wrote:

Not to start an argument, but you could reverse that logic and say "Do you want
to hurt the smart, ssl users by not including helpful functionality that could
be dangerous to uneducated non-ssl users?"

IMHO, it really depends on the design philosophy that PostgreSQL follows. I'm
familiar with the strong push for stability, and I approve. But I'm not as
sure I have a feel for what developers think about this kind of thing.

If you made it a compile-time option, or made it disabled by default and
requires a special setting in postgresql.conf to enable. Would that be secure?
Not really, as stupid users would still enable it without understanding, and
there's always the possibility that a some packager would build it with
dangerous settings and distribute it widely.

(As a side note, I seem to remember a program that had a --shoot-my-own-foot
option to ./configure ... but I can't remember what it was ...)

So, the question becomes one of design philosophy (at least, I'm basing this on
the concept that actual implementation would not be too hard, correct me if I'm
wrong)

You are correct. The question is whether it is worth adding that level
of complexity into the system --- in the past, we have decided it isn't.
We have the $HOME/.pgpass file to store username/password combinations
that is probably best, though it works only with libpq-based interfaces.

-- 
  Bruce Momjian                        |  http://candle.pha.pa.us
  pgman@candle.pha.pa.us               |  (610) 359-1001
  +  If your life is a hard drive,     |  13 Roberts Road
  +  Christ can be your backup.        |  Newtown Square, Pennsylvania 19073
#8Mark Rae
mrae@purplebat.com
In reply to: Bill Moran (#6)
Re: Feature idea

On Tue, Jun 15, 2004 at 11:43:08AM -0400, Bill Moran wrote:

Bruce Momjian <pgman@candle.pha.pa.us> wrote:

Bill Moran wrote:

Bruce Momjian <pgman@candle.pha.pa.us> wrote:

Chris Ochs wrote:

What if SET SESSION AUTHORIZATION could also accept a password so that non
superusers could switch to a different user? How difficult would this be?

Not to start an argument, but you could reverse that logic and say "Do you want
to hurt the smart, ssl users by not including helpful functionality that could
be dangerous to uneducated non-ssl users?"
...
So, the question becomes one of design philosophy
(at least, I'm basing this on the concept that actual implementation
would not be too hard, correct me if I'm wrong)

How about each user can set up a list of authorised users that
are allowed to switch to their username.

This would then follow the same model as authorized_keys/.rhosts in
ssh/rsh

user1 could then call something like

GRANT SESSION TO user2

which would allow user2 to switch to user1

Would it also be possible to restrict the grants when doing this?

e.g.

GRANT SESSION SELECT ON DATABASE foo TO user2
GRANT SESSION UPDATE ON TABLE bar TO user2

Which would allow updates to be made to table bar after the switch.

-Mark