[MDEV-32691] enhanced "Password Reuse Check Plugin" to STIG Standard Created: 2023-11-06 Updated: 2023-11-07 Resolved: 2023-11-07 |
|
| Status: | Closed |
| Project: | MariaDB Server |
| Component/s: | Authentication and Privilege System, Plugins |
| Fix Version/s: | N/A |
| Type: | Task | Priority: | Major |
| Reporter: | Richard Stracke | Assignee: | Unassigned |
| Resolution: | Won't Do | Votes: | 1 |
| Labels: | authentication | ||
| Description |
|
STIG Standards are:
https://www.stigviewer.com/stig/database_security_requirements_guide/2022-06-13/finding/V-206555 1. will already be covered from Simple Password Check Plugin 2. Adding variable password_reuse_min_percentage 3.c can be theroretically be emulated (more or less) with manipulating So adding a variable like password_reuse_check_min_changed password_reuse_check_min_changed |
| Comments |
| Comment by Sergei Golubchik [ 2023-11-06 ] |
|
For the reference, that document says that
Which means one should use unix_socket/pam/gssapi plugins. And when it's impossible, one should use SSL certiicates for authentication. And when even that is impossible, one is allowed to resort to passwords. |
| Comment by Alexander Keremidarski [ 2023-11-06 ] |
|
The implementing of c. creates a huge security risk. This requires storing an information about which characters are used in the current password which is pretty much equivalent to storing the password in clear text. This is an insane requirement. |