Tiago L. Alves created CASSANDRA-20648:
------------------------------------------
Summary: Improves check for sensitive credentials in cqlsh config
Key: CASSANDRA-20648
URL: https://issues.apache.org/jira/browse/CASSANDRA-20648
Project: Apache Cassandra
Issue Type: Improvement
Reporter: Tiago L. Alves
In CASSANDRA-16456 plugin support was added for cqlsh. In this implementation,
a check was added to verify if the config file where we have stored the
password for plain-text authentication is secure. A warning is printed if the
config file is owned or readable by others in the system. See
[https://github.com/apache/cassandra/blob/d4fb51347ca44386a0307bbfe1860d7ef16859e5/pylib/cqlshlib/authproviderhandling.py#L34]
This verification addresses only the scenario where the auth provider is the
PlainTextAuthProvider. However, if anyone implements it's own provider storing
sensitive credentials in the config, this check would not warn the user of it.
One way to improve this checks would be to check for known keys used to store
credentials (e.g. `password`, `secret`, `basicauth`).
Another way, would be to provide a method that could be overwritten by plugins
with the keys used for sensitive keywords, and use it.
--
This message was sent by Atlassian Jira
(v8.20.10#820010)
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]