Re: [pgadmin-hackers] Client-side password encryption

Поиск
Список
Период
Сортировка
От Martijn van Oosterhout
Тема Re: [pgadmin-hackers] Client-side password encryption
Дата
Msg-id 20051223152411.GB27014@svana.org
обсуждение исходный текст
Ответ на Re: [pgadmin-hackers] Client-side password encryption  (Stephen Frost <sfrost@snowman.net>)
Ответы Re: [pgadmin-hackers] Client-side password encryption  (Stephen Frost <sfrost@snowman.net>)
Список pgsql-hackers
On Fri, Dec 23, 2005 at 09:42:44AM -0500, Stephen Frost wrote:
> * Martijn van Oosterhout (kleptog@svana.org) wrote:
> > This isn't the first time this has been explained, but:
> >
> > With password encryption you essentially have two options:
> >
> > - Server knows password, use challenge-response authentication so
> > password is not visible on wire.
> > - Server only knows hash of password, password must be sent in clear
> > over wire.
>
> Erm, Postgres isn't doing either of these...?  You even talk about what
> Postgres does below so I'm kind of bemused that you don't mention it in
> your list... :)

Postgres *is* using one of these, the first one, where the server knows
the authentication token (the md5 hash of the password). UNIX login
uses the latter. Perhaps if you substitute "authentication token" for
"password" above it makes it clearer?

> Well, and these days quite often the network connection is encrypted.

If you use SSL or SSH? Sure. I think in that case you can setup
pg_hba.conf to require "password" in which case the server will only
accept an unhashed password.

> Stops the admin from guessing the password, but makes the text on the
> disk *the* authentication token, meaning someone who manages to get a
> copy of the password file gets full access to the system.

If md5 auth is setup, yes.

> There's also Kerberos, which I'm happy to say seems to be getting more
> and more use.  I'd really like to get ODBC Kerberos working, at least
> with MIT kerberos and then maybe someday (if I can manage to get it
> working...) setup some cross-realm stuff with the Windows AD and SSPI
> (iirc) things and have ODBC use that to authenticate against my
> Linux-based PostgreSQL server.

Yeah, I was counting kerberos under "trust a third party". It shouldn't
be too hard to add other such systems, like PAM has been...

Have a nice day,
--
Martijn van Oosterhout   <kleptog@svana.org>   http://svana.org/kleptog/
> Patent. n. Genius is 5% inspiration and 95% perspiration. A patent is a
> tool for doing 5% of the work and then sitting around waiting for someone
> else to do the other 95% so you can sue them.

В списке pgsql-hackers по дате отправления:

Предыдущее
От: Marko Kreen
Дата:
Сообщение: Re: [pgadmin-hackers] Client-side password encryption
Следующее
От: Stephen Frost
Дата:
Сообщение: Re: [pgadmin-hackers] Client-side password encryption