[MDEV-8808] Encryption of extra password available as machine administrator Created: 2015-09-17 Updated: 2017-05-30 Resolved: 2017-05-30 |
|
| Status: | Closed |
| Project: | MariaDB Server |
| Component/s: | OTHER |
| Fix Version/s: | N/A |
| Type: | Task | Priority: | Minor |
| Reporter: | VAROQUI Stephane | Assignee: | VAROQUI Stephane |
| Resolution: | Won't Fix | Votes: | 0 |
| Labels: | None | ||
| Issue Links: |
|
||||||||
| Description |
|
Additional features to ensure that system administrator can't login to the database and grant access to secured data by passing audit plugin. 1 - A malicious script that export data via usurpation of the backup user 1 - For backups and various DBA scripts we introduce an exec command and define events like CREATE ENCRYPTED EVENT ... EXEC("mysqldump -ubackup -ptoto ....") we can ensure like this that the command containing my precious database password is secured . such event will be store in encrypted tablespace using extra event_crypt system table . To not expose the password to ps command the user backup is extended with a 2 step authentication negotiated by the server itself and replaced in the exposed command. 2 - For replication we can store an additional key to master.info and multi_master.info that encrypt the password in the file. Empty key would define a not yet encrypted password 3 - Store and fetch the configuration from the remote key management plugin 4a - Encrypt system user table at startup after privileges loaded in memory and store the key in a file for decripting at next startup. 5 - Dumps can produce encrypted results adding extra command like /* 100108 */ set @@key=xxx; before every following multi row insert command encrypted with the key |
| Comments |
| Comment by Daniel Black [ 2015-10-31 ] |
|
alternative - use unix_socket auth for the backup user. Then there are no passwords. grant all on . to mysql@localhost identified via unix_socket. When this is the case only the mysql user can connect. I'm assuming you have some access control to prevent EXEC from non-priv users. |