Re: Rejecting weak passwords

Поиск
Список
Период
Сортировка
От Jeff Davis
Тема Re: Rejecting weak passwords
Дата
Msg-id 1254178917.22854.3.camel@monkey-cat.sm.truviso.com
обсуждение исходный текст
Ответ на Re: Rejecting weak passwords  (Josh Berkus <josh@agliodbs.com>)
Ответы Re: Rejecting weak passwords  (Andrew Dunstan <andrew@dunslane.net>)
Список pgsql-hackers
On Mon, 2009-09-28 at 15:52 -0700, Josh Berkus wrote:
> > It takes about 32 hours to brute force all passwords from [a-zA-Z0-9]
> > of up to 8 chars in length.
> 
> That would be a reason to limit the number of failed connection attempts
> from a single source, then, rather than a reason to change the hash
> function.

That doesn't solve the problem of an administrator brute-forcing your password.

Regards,Jeff Davis



В списке pgsql-hackers по дате отправления:

Предыдущее
От: Alvaro Herrera
Дата:
Сообщение: Re: TODO item: Allow more complex user/database default GUC settings
Следующее
От: Andrew Dunstan
Дата:
Сообщение: Re: Rejecting weak passwords