[HACKERS] Authentification method on client side checking

Поиск
Список
Период
Сортировка
От Victor Drobny
Тема [HACKERS] Authentification method on client side checking
Дата
Msg-id c5cb08f4cce46ff661ad287fadaa1b2a@postgrespro.ru
обсуждение исходный текст
Ответы Re: [HACKERS] Authentification method on client side checking  (Álvaro Hernández Tortosa <aht@8kdata.com>)
Список pgsql-hackers
Hello,

Despite the addition of SCRAM authentification to PostgreSQL 10, MITM 
attack can be performed by saying that the server supports, for example, 
only md5 authentication. The possible solution for it is checking 
authentification method on a client side and reject connections that 
could be unsafe.

Postgresql server can require unencrypted password passing, md5, scram, 
gss or sspi authentification.

In the attached patch you can find the solution for it. The new provided 
features are the following:
The parameter with acceptable authentification methods can be passed 
into connection methods of libpq library.
Also, this parameter can be specified to psql as a command line 
argument.
The documentation for command line arguments of psql and arguments of 
libpq methods are also presented.

Thank you for attention!

Best,
-- 
------
Victor Drobny
Postgres Professional: http://www.postgrespro.com
The Russian Postgres Company
-- 
Sent via pgsql-hackers mailing list (pgsql-hackers@postgresql.org)
To make changes to your subscription:
http://www.postgresql.org/mailpref/pgsql-hackers

Вложения

В списке pgsql-hackers по дате отправления:

Предыдущее
От: "Mengxing Liu"
Дата:
Сообщение: [HACKERS] [GSOC][weekly report 5] Eliminate O(N^2) scaling from rw-conflicttracking in serializable transactions
Следующее
От: Martin Mai
Дата:
Сообщение: Re: [HACKERS] [PATCH] Minor typo in the source repository documentation