It sounds like log_statement
is set to all
.
If you wish to prevent passwords from appearing in the logs while log_statement
is set to a value that captures ALTER USER
/ ALTER ROLE
then you'll want to override that when changing passwords. e.g.
BEGIN;
SET LOCAL log_statement = 'none';
ALTER USER ... SET PASSWORD ...;
COMMIT;
You must be a superuser to do this. Normal users cannot override logging rules.
It would be nice if PostgreSQL supported flagging some parameters to statements (or even functions) as security-sensitive and allowed users to request that they be masked in logs, pg_stat_statements
, pg_stat_activity
, etc. There is not currently any such feature - but hey, patches are welcome. If you're genuinely interested, post on pgsql-hackers before writing any actual code so you can get advice and comments, though. Alternately, speak to someone who does contract development.
In general PostgreSQL expects you to treat the logs as sensitive.
There are other areas where logging is a serious security concern. For example some of the pgcrypto
functions take crypto keys as parameters.