Re: BUG #10680: LDAP bind password leaks to log on failed authentication
От | Magnus Hagander |
---|---|
Тема | Re: BUG #10680: LDAP bind password leaks to log on failed authentication |
Дата | |
Msg-id | CABUevEzTfNTMF3F1hTyK1Lhq+2dt4fdCSyCrRF=BVgckf6y8ng@mail.gmail.com обсуждение исходный текст |
Ответ на | Re: BUG #10680: LDAP bind password leaks to log on failed authentication (Stephen Frost <sfrost@snowman.net>) |
Ответы |
Re: BUG #10680: LDAP bind password leaks to log on failed
authentication
|
Список | pgsql-bugs |
On Thu, Jun 19, 2014 at 5:37 PM, Stephen Frost <sfrost@snowman.net> wrote: > * Steven Siebert (smsiebe@gmail.com) wrote: > > There are currently three suggestions on a fix put forth already: > > 1) remove the raw line from the log entirely, just keeping the line > number > > 2) log that one specific event containing the raw log at a lower log > > level (ie debug) > > 3) parse out the password and continue to log the sanitized line at > > the same "level" (all) > > > > I'm OK with the fact that the patch I provided using the first > > approach seems to be denied. Can we consider either approach 2, 3, or > > perhaps a combination or 2/3? > > I actually don't really see a huge problem with 1, but I need to go > review the thread in more detail... > The reason the raw line was added in the first place was debugging cases where the running pg_hba.conf might not be the same as the one in the filesystem - either because of a reload not being done, or a reload of a broken file. I think 3 is a good option of these, assuming we can do it in a reasonably good way. -- Magnus Hagander Me: http://www.hagander.net/ Work: http://www.redpill-linpro.com/
В списке pgsql-bugs по дате отправления: