Martin Pihlak wrote:
Usually it would have been the server owner who created those user mappings in the first place -- so the passwords are already known to him/her. Of course it is possible to create the mappings first and later change the ownership of the server, thus exposing the passwords to a new role. But IMHO, it would be reasonable to assume that the owner of the server has full control over its user mappings.
Maybe we should rethink that. In the SQL standard, it says that USAGE on the server is required to create a user mapping. I think we could let users create mappings for their own user name if they have USAGE. And change the system views so a user can only see his own user mapping options.
More generally, using passwords in this way is always going to be a mediocre security solution, since the plaintext password will leak in all kinds of directions: system catalogs readable by superuser, server log readable by adm group members (depends on OS), psql_history, etc. I imagine that a proper authentication solution would involve credentials forwarding with either Kerberos or SSL or the like.
-- Sent via pgsql-hackers mailing list (pgsql-hackers@postgresql.org) To make changes to your subscription: http://www.postgresql.org/mailpref/pgsql-hackers