[MDEV-19496] PAM authentication credentials should always be encrypted Created: 2019-05-16 Updated: 2019-05-16 Resolved: 2019-05-16 |
|
| Status: | Closed |
| Project: | MariaDB Server |
| Component/s: | Plugin - pam |
| Affects Version/s: | None |
| Fix Version/s: | N/A |
| Type: | Bug | Priority: | Major |
| Reporter: | Manjot Singh (Inactive) | Assignee: | Sergei Golubchik |
| Resolution: | Won't Fix | Votes: | 0 |
| Labels: | None | ||
| Description |
|
I am filing this as a bug as this seems to be a security hole from a user perspective. PAM auth plugin should utilize encryption for credentials just as is expected with default authentication methods (perhaps via the default authentication plugin or other encryption scheme). This should happen regardless of TLS or REQUIRE SSL grant etc. |
| Comments |
| Comment by Sergei Golubchik [ 2019-05-16 ] |
|
authentication plugins are responsible for the authentication, not encryption. MariaDB cannot and should not require every single authentication plugin to implement its own on-the-wire encryption. That's what we have SSL for. |
| Comment by Manjot Singh (Inactive) [ 2019-05-16 ] |
|
@sergei - SSL has the overhead of encrypting ALL client traffic (data and queries) there are use cases where a user does not want or need that but also does not want passwords to go in plain text, especially when it has the risk of exposing an organization's total LDAP/Kerberos/etc infrastructure. |