vsql -w password: how secure?
How secure is using the "-w" option to vsql? I don't see the password in the Linux process list using the "ps" command. Is Vertica somehow obfuscating the password in the command line? If so, how secure is that?
0
Comments
The one place you can see it, and this is out of Vertica's control, is the command history at the OS level as shown below. Even this is somewhat ok because it's specific to the user, so unless someone has the password to log as the user they shouldn't be able to get to the history to see the vsql command and the password for the db.
[dbadmin@n4 ~]$ history | grep vsql
999* vsql -d test -U dbadmin -w 'vertpwd'
The other places of possible concern, typically customizations, would be:
- if you have any automation scripts that run vsql they might have the password in clear text so they should be permission masked accordingly.
- if you have set up a vbr.py config file for backups/restores/copydatabase and you've chosen to store the password vs. be prompted for it.
- if you're using the clients (odbc, jdbc, or ADO.Net) and you store a password vs prompting.
> sleep 'echo 1' | ps -o command | grep leep
sleep 1