[MDEV-19496] PAM authentication credentials should always be encrypted Created: 2019-05-16  Updated: 2019-05-16  Resolved: 2019-05-16

Status: Closed
Project: MariaDB Server
Component/s: Plugin - pam
Affects Version/s: None
Fix Version/s: N/A

Type: Bug Priority: Major
Reporter: Manjot Singh (Inactive) Assignee: Sergei Golubchik
Resolution: Won't Fix Votes: 0
Labels: None


 Description   

I am filing this as a bug as this seems to be a security hole from a user perspective.

PAM auth plugin should utilize encryption for credentials just as is expected with default authentication methods (perhaps via the default authentication plugin or other encryption scheme).

This should happen regardless of TLS or REQUIRE SSL grant etc.



 Comments   
Comment by Sergei Golubchik [ 2019-05-16 ]

authentication plugins are responsible for the authentication, not encryption.

MariaDB cannot and should not require every single authentication plugin to implement its own on-the-wire encryption. That's what we have SSL for.

Comment by Manjot Singh (Inactive) [ 2019-05-16 ]

@sergei - SSL has the overhead of encrypting ALL client traffic (data and queries) there are use cases where a user does not want or need that but also does not want passwords to go in plain text, especially when it has the risk of exposing an organization's total LDAP/Kerberos/etc infrastructure.

Generated at Thu Feb 08 08:52:08 UTC 2024 using Jira 8.20.16#820016-sha1:9d11dbea5f4be3d4cc21f03a88dd11d8c8687422.