Re: about "pg_dump " without pompt password

Поиск
Список
Период
Сортировка
От David Garamond
Тема Re: about "pg_dump " without pompt password
Дата
Msg-id 415F8304.5020203@zara.6.isreserved.com
обсуждение исходный текст
Ответ на Re: about "pg_dump " without pompt password  (Tom Lane <tgl@sss.pgh.pa.us>)
Список pgsql-general
Tom Lane wrote:
>>At least in Linux, mysql replaces the password in the command line
>>argument with "xxxxxxxx" so you can't see them via "ps" nor via peeking
>>into /proc/<PID>/cmdline.
>
>>There is a short period where the password is visible though.
>
>>Are there any other risks? Or is the reason for not doing this is
>>because not all OS'es supports replacing the command line information?
>
> You just enumerated two fatal strikes against it; do you need more?
> If so, consider the question of where the password on the command line
> is going to come from.  Allowing that would encourage people to put
> passwords into possibly-insecurely-stored scripts.  Or, depending on how
> complicated the shell script is, there might be ancestor shell processes
> that also have the password visible in their arguments ... and they
> are certainly not going to know to xxx it out.

Yeah, I have some Perl/Ruby scripts that does "wget --proxy-user ...
--proxy-passwd ..." that reports the output through crontab and I have
to do the XXX-ing manually to prevent everyone that receives the cron
output to read the username/password. Should've stored the password in
~/.wgetrc too, I guess.

> The ~/.pgpass technique is secure on every Unix, and we can *check* that
> it's secure, by refusing to use .pgpass if it's got group or world
> access allowed.

I love the Postgres community. It's all about doing things _properly_. :-)

--
dave

В списке pgsql-general по дате отправления:

Предыдущее
От: Tom Lane
Дата:
Сообщение: Re: earthdistance is not giving correct results.
Следующее
От: "Joolz"
Дата:
Сообщение: storing files: blob, toasted text of filesystem?