|
1 | 1 | package metrics |
2 | 2 |
|
3 | 3 | import ( |
| 4 | +"strings" |
| 5 | + |
4 | 6 | "github.com/Releem/mysqlconfigurer/config" |
5 | 7 | "github.com/Releem/mysqlconfigurer/models" |
6 | 8 | "github.com/Releem/mysqlconfigurer/utils" |
@@ -51,59 +53,101 @@ func security_recommendations(DbInfo *DbInfoGatherer) []models.MetricGroupValue |
51 | 53 | var output_users []models.MetricGroupValue |
52 | 54 |
|
53 | 55 | var password_column_exists, authstring_column_exists int |
54 | | -err := models.DB.QueryRow("SELECT 1 FROM information_schema.columns WHERE TABLE_SCHEMA = 'mysql' AND TABLE_NAME = 'user' AND COLUMN_NAME = 'password'").Scan(&password_column_exists) |
55 | | -if err != nil { |
56 | | -DbInfo.logger.Error(err) |
57 | | -} |
58 | | -err = models.DB.QueryRow("SELECT 1 FROM information_schema.columns WHERE TABLE_SCHEMA = 'mysql' AND TABLE_NAME = 'user' AND COLUMN_NAME = 'authentication_string'").Scan(&authstring_column_exists) |
59 | | -if err != nil { |
60 | | -DbInfo.logger.Error(err) |
61 | | -} |
62 | | -// DbInfo.logger.Info(password_column_exists, authstring_column_exists) |
| 56 | + |
| 57 | +// New table schema available since mysql-5.7 and mariadb-10.2 |
| 58 | +// But need to be checked |
| 59 | +models.DB.QueryRow("SELECT 1 FROM information_schema.columns WHERE TABLE_SCHEMA = 'mysql' AND TABLE_NAME = 'user' AND COLUMN_NAME = 'password'").Scan(&password_column_exists) |
| 60 | +models.DB.QueryRow("SELECT 1 FROM information_schema.columns WHERE TABLE_SCHEMA = 'mysql' AND TABLE_NAME = 'user' AND COLUMN_NAME = 'authentication_string'").Scan(&authstring_column_exists) |
63 | 61 | PASS_COLUMN_NAME := "password" |
64 | 62 | if password_column_exists == 1 && authstring_column_exists == 1 { |
65 | 63 | PASS_COLUMN_NAME = "IF(plugin='mysql_native_password', authentication_string, password)" |
66 | 64 | } else if authstring_column_exists == 1 { |
67 | 65 | PASS_COLUMN_NAME = "authentication_string" |
68 | 66 | } else if password_column_exists != 1 { |
| 67 | +DbInfo.logger.Info("Skipped due to none of known auth columns exists") |
69 | 68 | return output_users |
70 | 69 | } |
71 | | -DbInfo.logger.Info(PASS_COLUMN_NAME) |
| 70 | +DbInfo.logger.Info("Password column = ", PASS_COLUMN_NAME) |
72 | 71 |
|
73 | | -var Username, User, Host, Blank_Password, Password_As_User string |
74 | | -rows_users, err := models.DB.Query("SELECT CONCAT(QUOTE(user), '\\@', QUOTE(host)), user, host, (" + PASS_COLUMN_NAME + " = '' OR " + PASS_COLUMN_NAME + " IS NULL) as Blank_Password, (CAST(" + PASS_COLUMN_NAME + " as Binary) = PASSWORD(user) OR CAST(" + PASS_COLUMN_NAME + " as Binary) = PASSWORD(UPPER(user)) ) as Password_As_User FROM mysql.user") |
75 | | -if err != nil || rows_users.Next() == false { |
76 | | -DbInfo.logger.Error(err) |
77 | | -rows_users, err = models.DB.Query("SELECT CONCAT(QUOTE(user), '\\@', QUOTE(host)), user, host, (" + PASS_COLUMN_NAME + " = '' OR " + PASS_COLUMN_NAME + " IS NULL) as Blank_Password, (CAST(" + PASS_COLUMN_NAME + " as Binary) = CONCAT('*',UPPER(SHA1(UNHEX(SHA1(user))))) OR CAST(" + PASS_COLUMN_NAME + " as Binary) = CONCAT('*',UPPER(SHA1(UNHEX(SHA1(UPPER(user)))))) ) as Password_As_User FROM mysql.user") |
| 72 | +var Username, User, Host, Password_As_User string |
| 73 | +rows_users, err := models.DB.Query("SELECT CONCAT(QUOTE(user), '@', QUOTE(host)), user, host, (CAST(" + PASS_COLUMN_NAME + " as Binary) = PASSWORD(user) OR CAST(" + PASS_COLUMN_NAME + " as Binary) = PASSWORD(UPPER(user)) ) as Password_As_User FROM mysql.user") |
| 74 | +if err != nil || !rows_users.Next() { |
| 75 | +if strings.Contains(err.Error(), "Error 1064 (42000): You have an error in your SQL syntax") { |
| 76 | +DbInfo.logger.Info("PASSWORD() function is not supported. Try another query...") |
| 77 | +} else { |
| 78 | +DbInfo.logger.Error(err) |
| 79 | +} |
| 80 | +rows_users, err = models.DB.Query("SELECT CONCAT(QUOTE(user), '@', QUOTE(host)), user, host, (CAST(" + PASS_COLUMN_NAME + " as Binary) = CONCAT('*',UPPER(SHA1(UNHEX(SHA1(user))))) OR CAST(" + PASS_COLUMN_NAME + " as Binary) = CONCAT('*',UPPER(SHA1(UNHEX(SHA1(UPPER(user)))))) ) as Password_As_User FROM mysql.user") |
78 | 81 | if err != nil { |
79 | 82 | DbInfo.logger.Error(err) |
80 | | -return output_users |
81 | 83 | } |
82 | 84 | defer rows_users.Close() |
83 | 85 | for rows_users.Next() { |
84 | | -err := rows_users.Scan(&Username, &User, &Host, &Blank_Password, &Password_As_User) |
| 86 | +err := rows_users.Scan(&Username, &User, &Host, &Password_As_User) |
85 | 87 | if err != nil { |
86 | 88 | DbInfo.logger.Error(err) |
87 | | -continue |
| 89 | +} else { |
| 90 | +output_users = append(output_users, models.MetricGroupValue{"Username": Username, "User": User, "Host": Host, "Password_As_User": Password_As_User}) |
88 | 91 | } |
89 | | -output_users = append(output_users, models.MetricGroupValue{"Username": Username, "User": User, "Host": Host, "Blank_Password": Blank_Password, "Password_As_User": Password_As_User}) |
90 | 92 | } |
91 | 93 | } else { |
92 | 94 | defer rows_users.Close() |
93 | | -err := rows_users.Scan(&Username, &User, &Host, &Blank_Password, &Password_As_User) |
| 95 | +err := rows_users.Scan(&Username, &User, &Host, &Password_As_User) |
94 | 96 | if err != nil { |
95 | 97 | DbInfo.logger.Error(err) |
96 | 98 | } else { |
97 | | -output_users = append(output_users, models.MetricGroupValue{"Username": Username, "User": User, "Host": Host, "Blank_Password": Blank_Password, "Password_As_User": Password_As_User}) |
| 99 | +output_users = append(output_users, models.MetricGroupValue{"Username": Username, "User": User, "Host": Host, "Password_As_User": Password_As_User}) |
98 | 100 | } |
99 | 101 | for rows_users.Next() { |
100 | | -err := rows_users.Scan(&Username, &User, &Host, &Blank_Password, &Password_As_User) |
| 102 | +err := rows_users.Scan(&Username, &User, &Host, &Password_As_User) |
101 | 103 | if err != nil { |
102 | 104 | DbInfo.logger.Error(err) |
103 | | -continue |
| 105 | +} else { |
| 106 | +output_users = append(output_users, models.MetricGroupValue{"Username": Username, "User": User, "Host": Host, "Password_As_User": Password_As_User}) |
104 | 107 | } |
105 | | -output_users = append(output_users, models.MetricGroupValue{"Username": Username, "User": User, "Host": Host, "Blank_Password": Blank_Password, "Password_As_User": Password_As_User}) |
106 | 108 | } |
107 | 109 | } |
| 110 | + |
| 111 | +output_user_blank_password := make(models.MetricGroupValue) |
| 112 | +rows_users, err = models.DB.Query("SELECT CONCAT(QUOTE(user), '@', QUOTE(host)) FROM mysql.global_priv WHERE ( user != '' AND JSON_CONTAINS(Priv, '\"mysql_native_password\"', '$.plugin') AND JSON_CONTAINS(Priv, '\"\"', '$.authentication_string') AND NOT JSON_CONTAINS(Priv, 'true', '$.account_locked'))") |
| 113 | +if err != nil { |
| 114 | +if strings.Contains(err.Error(), "Error 1146 (42S02): Table 'mysql.global_priv' doesn't exist") { |
| 115 | +DbInfo.logger.Info("Not MariaDB, try another query...") |
| 116 | +} else { |
| 117 | +DbInfo.logger.Error(err) |
| 118 | +} |
| 119 | +rows_users, err = models.DB.Query("SELECT CONCAT(QUOTE(user), '@', QUOTE(host)) FROM mysql.user WHERE (" + PASS_COLUMN_NAME + " = '' OR " + PASS_COLUMN_NAME + " IS NULL) AND user != '' /*!50501 AND plugin NOT IN ('auth_socket', 'unix_socket', 'win_socket', 'auth_pam_compat') */ /*!80000 AND account_locked = 'N' AND password_expired = 'N' */") |
| 120 | +if err != nil { |
| 121 | +DbInfo.logger.Error(err) |
| 122 | +} |
| 123 | +defer rows_users.Close() |
| 124 | +for rows_users.Next() { |
| 125 | +err := rows_users.Scan(&Username) |
| 126 | +if err != nil { |
| 127 | +DbInfo.logger.Error(err) |
| 128 | +} else { |
| 129 | +output_user_blank_password[Username] = 1 |
| 130 | +} |
| 131 | +} |
| 132 | +} else { |
| 133 | +defer rows_users.Close() |
| 134 | +for rows_users.Next() { |
| 135 | +err := rows_users.Scan(&Username) |
| 136 | +if err != nil { |
| 137 | +DbInfo.logger.Error(err) |
| 138 | +} else { |
| 139 | +output_user_blank_password[Username] = 1 |
| 140 | +} |
| 141 | +} |
| 142 | +} |
| 143 | + |
| 144 | +for i, user := range output_users { |
| 145 | +if _, ok := output_user_blank_password[user["Username"].(string)]; ok { |
| 146 | +output_users[i]["Blank_Password"] = 1 |
| 147 | +} else { |
| 148 | +output_users[i]["Blank_Password"] = 0 |
| 149 | +} |
| 150 | +} |
| 151 | + |
108 | 152 | return output_users |
109 | 153 | } |
0 commit comments