Re: [pgadmin-hackers] Client-side password encryption

Поиск
Список
Период
Сортировка
От Tom Lane
Тема Re: [pgadmin-hackers] Client-side password encryption
Дата
Msg-id 16420.1135316391@sss.pgh.pa.us
обсуждение исходный текст
Ответ на Re: [pgadmin-hackers] Client-side password encryption  (Christopher Kings-Lynne <chriskl@familyhealth.com.au>)
Ответы Re: [pgadmin-hackers] Client-side password encryption  (Greg Stark <gsstark@mit.edu>)
Список pgsql-hackers
Christopher Kings-Lynne <chriskl@familyhealth.com.au> writes:
> AndrewSN can't post at the moment, but asked me to post this for him:
> "Knowing the md5 hash is enough to authenticate via the 'md5' method in 
> pg_hba.conf, even if you don't know the original password.

If you know the md5 hash, you know everything the postmaster does, so
it's hard to see where such an attacker is going to be stopped.  The
entire point here is not to expose the cleartext password, and that
really has nothing to do with whether you're going to break into the
PG database.  It's about protecting users who are foolish enough to
use the same cleartext password for multiple services.
        regards, tom lane


В списке pgsql-hackers по дате отправления:

Предыдущее
От: Christopher Kings-Lynne
Дата:
Сообщение: Re: [pgadmin-hackers] Client-side password encryption
Следующее
От: Simon Riggs
Дата:
Сообщение: Re: [Bizgres-general] WAL bypass for INSERT, UPDATE and