Tiago L. Alves created CASSANDRA-20648: ------------------------------------------
Summary: Improves check for sensitive credentials in cqlsh config Key: CASSANDRA-20648 URL: https://issues.apache.org/jira/browse/CASSANDRA-20648 Project: Apache Cassandra Issue Type: Improvement Reporter: Tiago L. Alves In CASSANDRA-16456 plugin support was added for cqlsh. In this implementation, a check was added to verify if the config file where we have stored the password for plain-text authentication is secure. A warning is printed if the config file is owned or readable by others in the system. See [https://github.com/apache/cassandra/blob/d4fb51347ca44386a0307bbfe1860d7ef16859e5/pylib/cqlshlib/authproviderhandling.py#L34] This verification addresses only the scenario where the auth provider is the PlainTextAuthProvider. However, if anyone implements it's own provider storing sensitive credentials in the config, this check would not warn the user of it. One way to improve this checks would be to check for known keys used to store credentials (e.g. `password`, `secret`, `basicauth`). Another way, would be to provide a method that could be overwritten by plugins with the keys used for sensitive keywords, and use it. -- This message was sent by Atlassian Jira (v8.20.10#820010) --------------------------------------------------------------------- To unsubscribe, e-mail: commits-unsubscr...@cassandra.apache.org For additional commands, e-mail: commits-h...@cassandra.apache.org