Oracle recently announced a new authentication plugin:
caching_sha2_password. This was added in 8.0.4, the second release candidate for MySQL 8.0. The new plugin is also made the default (can be configured by changing
Phasing out SHA1
Adding a salt makes hashes for identical passwords, but different users different. Again a good reason to do this.
Their earlier attempt at this resulted in
sha256_password. But this resulted in slower authentication. Without using persistent connections this is a serious limitation. So again a good reason.
If you don’t use SSL/TLS it gives your password away.
To protect against sending the password in cleartext over an insecure connection it encrypts the password before sending it. It does this by using public key cryptography. It encrypts the password with the public key of the server. Then the server can decrypt it with its private key. So far so good.
But the problem is how MySQL gets the public from the server. There is
--get-server-public-key which requests the key from the server. But it does so over an insecure connection, so this isn’t safe.
An attacker could do a Man-in-the-Middle attack and give you their public key… and then the attacker can decrypt your password and proxy the connection.
The second option is to use
--server-public-key-path=file_name. But then you somehow need to collect all public keys from all your servers and securely distribute them to your clients. And you might want to renew these keys every year… this seems like an operational nightmare to me.
Also depending on what connector you use these options may not be available.
If you use SSL/TLS things are not much better.
With default settings mysqld generates self-signed X509 certificates and enables SSL/TLS. And the default
PREFERRED. This is better than the previous defaults as it guards against passive attacks. However this is NOT protecting against active attacks (MitM attacks) as MySQL won’t verify if the certificate is signed by a known CA. It by default also doesn’t verify if the hostname matches the certificate.
So if someone hijacks your connection and knowns how to do a SSL handshake: then the
caching_sha2_password plugin will handover the password in clear text.
Can we use it in a secure way?
Use SSL/TLS and set
VERIFY_IDENTITY (or at least
VERIFY_CA). Note that this requires you to configure MySQL with certificates which are signed by your CA and matches the hostnames of your servers.
In case you only need localhost connections: configure MySQL to only listen on local-loopback and you’re done.
mysql_native_password seems also to be an acceptable option for now. Note that
sha256_password has many of the same issues and should also be avoided without strict SSL/TLS settings.
I initially reported this to Oracle in Bug #79944 on 13 January 2016 for the
sha256_password plugin in 5.7.10.