[ 
https://issues.apache.org/jira/browse/CASSANDRA-20648?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Tiago L. Alves updated CASSANDRA-20648:
---------------------------------------
    Component/s: Tool/cqlsh

> Improves check for sensitive credentials in cqlsh config
> --------------------------------------------------------
>
>                 Key: CASSANDRA-20648
>                 URL: https://issues.apache.org/jira/browse/CASSANDRA-20648
>             Project: Apache Cassandra
>          Issue Type: Improvement
>          Components: Tool/cqlsh
>            Reporter: Tiago L. Alves
>            Priority: Normal
>
> In CASSANDRA-16456 plugin support was added for cqlsh. In this 
> implementation, a check was added to verify if the config file where we have 
> stored the password for plain-text authentication is secure. A warning is 
> printed if the config file is owned or readable by others in the system. See 
> [https://github.com/apache/cassandra/blob/d4fb51347ca44386a0307bbfe1860d7ef16859e5/pylib/cqlshlib/authproviderhandling.py#L34]
>  
> This verification addresses only the scenario where the auth provider is the 
> PlainTextAuthProvider. However, if anyone implements it's own provider 
> storing sensitive credentials in the config, this check would not warn the 
> user of it.
> One way to improve this checks would be to check for known keys used to store 
> credentials (e.g. `password`, `secret`, `basicauth`).
> Another way, would be to provide a method that could be overwritten by 
> plugins with the keys used for sensitive keywords, and use it.
>  
>  
>  



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

---------------------------------------------------------------------
To unsubscribe, e-mail: commits-unsubscr...@cassandra.apache.org
For additional commands, e-mail: commits-h...@cassandra.apache.org

Reply via email to