MySQL5.6 will automatically hide the password information in the log. Next, we will introduce in detail how MySQL5.6 can process the password more securely. If you are interested, please refer to me and hope to help you
MySQL 5.6 will automatically hide the password information in the log. Next, we will introduce in detail how MySQL 5.6 processes the password more securely. If you are interested, refer, hope to help you
MySQL 5.6 will automatically hide the password information in the log. This is not just obfuscation, and then stores the unidirectional hash value in the log file. You can disable Password Hiding for log files by setting log-raw = OFF. The log-raw setting only affects general logs, while the password is hidden in slow query logs and binary logs.
In MySQL 5.5, this requires manual processing when the hash is stored in the variable for the first time. However, this is useless in most scenarios.
However, according to the mysql Command manual, the mysql command does not record the statement that matches "* IDENTIFIED *: * PASSWORD.
However, do not forget to verify the permission protection for the MySQL server and client log files, including other files such as master.info. In addition, if you need to use the MySQL privileged system for protection when storing slave node creden in the database, if master.info enables someone to have too many database permissions, you can also use load data infile to LOAD the content.
Of course, there are still some improvements:
This is even better if we can easily enable secure connections. MySQL and many other applications use TLS, but there are some performance problems and it is not easy to set. In addition, MySQL is not secure by default and is simple.
Therefore, the security of MySQL 5.6 is improved without any configuration.