The unix_socket plugin authenticates users connecting via the local Unix socket file by matching the operating system user ID to the database user account.
The unix_socket authentication plugin is installed by default, and it is used by the 'root'@'localhost' user account by default. See Authentication for more information.
The unix_socket authentication plugin allows the user to use operating system credentials when connecting to MariaDB via the local Unix socket file. This Unix socket file is defined by the socket system variable.
The unix_socket authentication plugin works by calling the getsockopt system call with the SO_PEERCRED socket option, which allows it to retrieve the uid of the process that is connected to the socket. It is then able to get the user name associated with that uid. Once it has the user name, it will authenticate the connecting user as the MariaDB account that has the same user name.
The unix_socket authentication plugin is not suited to multiple Unix users accessing a single MariaDB user account.
A unix_socket authentication plugin is a passwordless security mechanism. Its security lies in the strength of the access to the Unix user, rather than the complexity and the secrecy of the password.
As security differs from password security, the strengths and weaknesses need to be considered, and those can differ depending on the specific installation.
Access is limited to the Unix user so, for example, a www-data user cannot access root with the unix_socket authentication plugin.
There is no password which can be cracked by brute force.
There is no password that can be accidentally exposed by user accident, poor security on backups, or poor security on passwords in configuration files.
The strength of a unix_socket authentication plugin is effectively the strength of the security of the Unix users on the system. In most cases, the Unix user default installation is sufficiently secure. However, the following is a non-exhaustive list of potential Unix user security issues that may arise.
Common access areas without screen locks, where an unauthorized user accesses the logged in Unix user of an authorized user.
Extensive sudo access grants that provide users with access to execute commands of a different Unix user.
Scripts writable by Unix users other than the Unix user that are executed (via cron or directly) by the Unix user.
Web pages that are susceptible to command injection, where the Unix user running the web page has elevated privileges in the database that weren't intended to be used.
In some of these scenarios a database password may prevent these security exploits, however it will remove all the strengths of the unix_socket authentication plugin previously mentioned.
The unix_socket authentication plugin is installed by default.
If you do not want it to be available by default, you must disable it.
The unix_socket authentication plugin is also installed by default in new installations that use the packages provided by Debian's default repositories and Ubuntu's default repositories. See for more information.
The unix_socket authentication plugin can be disabled by starting the server with the option set to OFF. This can be specified as a command-line argument to or it can be specified in a relevant server in an :
As an alternative, the option can also be set to OFF by pairing the option with the disable :
The unix_socket authentication plugin is installed by default in almost all MariaDB server versions. If you work with a version that doesn't have the plugin installed, you can install it as described in one of the following ways.
Install the plugin without restarting the server. You can install the plugin dynamically, by executing or :
Instruct the server to load the plugin at startup. The plugin can be installed this way by providing the or the options. This can be specified as a command-line argument to or it can be specified in a relevant server in an :
You can uninstall the plugin dynamically by executing or :
If you installed the plugin by providing the or the options in a server in an , those options should be removed to prevent the plugin from being loaded the next time the server is restarted.
To create a user account via , specify the name of the plugin in the clause:
If does not have NO_AUTO_CREATE_USER set, then you can also create the user account via :
The authentication string (if present) is compared with the socket's user name. Authentication proceeds if there's a match. In this case, the system variable contains the OS user.
Consider an OS user named 'bob' that has been created like this:
That user can connect like this:
Alternatively, accessing the sock file directly, the user can connect like this:
Once connected, you can view that user like this:
The plugin only checks whether the OS socket user id matches the MariaDB user name. It ignores the authentication string.
If Unix socket authentication does not meet your needs, you can switch a user account back to password-based authentication, by telling MariaDB to use a different for the account. The specific authentication plugin is specified with the clause. To switch to the authentication plugin, you need to do this:
If you use scripts that require passwordless access to MariaDB, this would cause them to break. You may be able to fix that by setting a password in the [client] in your /root/.my.cnf .
The unix_socket authentication plugin does not require any specific client authentication plugins. It should work with all clients.
The unix_socket authentication plugin does not require any special support in client libraries. It should work with all client libraries.
In this example, user serg is already logged into the operating system and has full shell access. The user has already authenticated with the operating system and the MariaDB account is configured to use the unix_socket authentication plugin, so there is no need to authenticate again for the database. MariaDB accepts the operating system credentials and allows the user to connect. However, any attempt to connect to the database as another operating system is denied.
unix_socketDescription: Controls how the server should treat the plugin when the server starts up.
Valid values are:
OFF - Disables the plugin without removing it from the table.
This page is licensed: CC BY-SA / Gnu FDL
Default Unix user security is usually strong on preventing remote access and password brute force attempts.
Poor Unix user password practices including weak user passwords, password exposure and password reuse accompanied by an access vulnerability/mechanism of an unauthorized user to exploit this weakness.
Weak remote access mechanisms and network file system privileges.
Poor user security behavior including running untrusted scripts and software.
ON - Enables the plugin. If the plugin cannot be initialized, then the server will still continue starting up, but the plugin will be disabled.FORCE - Enables the plugin. If the plugin cannot be initialized, then the server will fail to start with an error.
FORCE_PLUS_PERMANENT - Enables the plugin. If the plugin cannot be initialized, then the server will fail to start with an error. In addition, the plugin cannot be uninstalled with UNINSTALL SONAME or UNINSTALL PLUGIN while the server is running.
See Plugin Overview: Configuring Plugin Activation at Server Startup for more information.
Command line: --unix-socket=value
Data Type: enumerated
Default Value: ON
Valid Values: OFF, ON, FORCE, FORCE_PLUS_PERMANENT
[mariadb]
...
unix_socket=OFF[mariadb]
...
disable_unix_socketINSTALL SONAME 'auth_socket';[mariadb]
...
plugin_load_add = auth_socketUNINSTALL SONAME 'auth_socket';CREATE USER username@hostname IDENTIFIED VIA unix_socket;GRANT SELECT ON db.* TO username@hostname IDENTIFIED VIA unix_socket;CREATE USER A identified via unix_socket as 'bob';
mariadb -uAmariadb -uA -S /var/run/mysqld/mysqld.sockSELECT USER(),@@external_user;
+-------------+-----------------+
| user() | @@external_user |
+-------------+-----------------+
| A@localhost | bob |
+-------------+-----------------+ALTER USER root@localhost IDENTIFIED VIA mysql_native_password;
SET PASSWORD = PASSWORD('foo');[client]
password=foo$ mysql -uroot
MariaDB []> CREATE USER serg IDENTIFIED VIA unix_socket;
MariaDB []> CREATE USER monty IDENTIFIED VIA unix_socket;
MariaDB []> quit
Bye
$ whoami
serg
$ mysql --user=serg
Welcome to the MariaDB monitor. Commands end with ; or \g.
Your MariaDB connection id is 2
Server version: 5.2.0-MariaDB-alpha-debug Source distribution
MariaDB []> quit
Bye
$ mysql --user=monty
ERROR 1045 (28000): Access denied for user 'monty'@'localhost' (using password: NO)