The Vitess 9.0 Documentation
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279 LDAP authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303 User Management and Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304 Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305 Other authentication methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .0 码力 | 417 页 | 2.96 MB | 1 年前3The Vitess 12.0 Documentation
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342 LDAP authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371 Server authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371 Client authentication . . . . . . . . . . . . . . . . . . . . 386 User Management and Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 387 Authentication . . . . . . . . . . . . . . . . . . .0 码力 | 534 页 | 3.32 MB | 1 年前3The Vitess 11.0 Documentation
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320 LDAP authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 344 User Management and Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345 Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 347 Other authentication methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .0 码力 | 481 页 | 3.14 MB | 1 年前3The Vitess 10.0 Documentation
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298 LDAP authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 322 User Management and Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323 Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325 Other authentication methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .0 码力 | 455 页 | 3.07 MB | 1 年前3The Vitess 8.0 Documentation
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238 LDAP authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263 User Management and Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264 Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265 Other authentication methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .0 码力 | 331 页 | 1.35 MB | 1 年前3Pentest-Report Vitess 02.2019
Str. 14 D 10709 Berlin cure53.de · mario@cure53.de • The cryptographic and authentication-related aspects were analyzed for potential general bypasses but no flaws allowing for such circumvention de · mario@cure53.de • Additional testing for filter circumvention did not uncover any methods to successfully achieve Remote Code Execution. All enumerated endpoints were investigated for bypasses (Info) One of the discovered issues allows an attacker to perform a timing attack against the authentication of the Vitess server. This attack requires an adversary who is in possession of the0 码力 | 9 页 | 155.02 KB | 1 年前3The Vitess 6.0 Documentation
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201 Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . tatic_creds.json" \ In this example, vtgate accepts MySQL connections on port 15306 and the authentication info is stored in the json file. So, you should be able to connect to it using the following using the PREPARE and EXECUTE SQL statements are not supported. Authentication Plugins Vitess supports the mysql_native_password authentication plugin. Support for caching_sha2_password can be tracked in0 码力 | 210 页 | 846.79 KB | 1 年前3The Vitess 5.0 Documentation
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201 Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . tatic_creds.json" \ In this example, vtgate accepts MySQL connections on port 15306 and the authentication info is stored in the json file. So, you should be able to connect to it using the following using the PREPARE and EXECUTE SQL statements are not supported. Authentication Plugins Vitess supports the mysql_native_password authentication plugin. Support for caching_sha2_password can be tracked in0 码力 | 206 页 | 875.06 KB | 1 年前3Vitess security audit
requests to the Vitess internals: From https://vitess.io/docs/17.0/reference/vtadmin/architecture/ Authentication and authorization VTAdmin does two things when receiving incoming requests: 1) It first authenticates and 2) it then checks the authorization level for the user sending the request. In VTAdmin, authentication is the task of obtaining the actor that is sending the request, and authorization evaluates whether RBAC. As such, the flow of handling the permissions of incoming requests looks as such: Authentication Authentication in VTAdmin has the purpose of answering the question of who is sending a request. VTAdmin0 码力 | 41 页 | 1.10 MB | 1 年前3The Vitess 7.0 Documentation
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245 Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . tatic_creds.json" \ In this example, vtgate accepts MySQL connections on port 15306 and the authentication info is stored in the json file. So, you should be able to connect to it using the following features in the Vitess ecosystem depend on authentication, like Caller ID and table ACLs. We’ll explore the Caller ID feature first. The encryption and authentication scheme used depends on the transport used0 码力 | 254 页 | 949.63 KB | 1 年前3
共 10 条
- 1