Re: Rejecting weak passwords

Поиск
Список
Период
Сортировка
От Peter Eisentraut
Тема Re: Rejecting weak passwords
Дата
Msg-id 1254224585.28005.15.camel@fsopti579.F-Secure.com
обсуждение исходный текст
Ответ на Re: Rejecting weak passwords  ("Joshua D. Drake" <jd@commandprompt.com>)
Список pgsql-hackers
On Mon, 2009-09-28 at 15:59 -0700, Joshua D. Drake wrote:
> On Mon, 2009-09-28 at 15:52 -0700, Josh Berkus wrote:
> > > It takes about 32 hours to brute force all passwords from [a-zA-Z0-9]
> > > of up to 8 chars in length.
> > 
> > That would be a reason to limit the number of failed connection attempts
> > from a single source, then, rather than a reason to change the hash
> > function.
> > 
> > Hmmm, that would be a useful, easy (I think) security feature: add a GUC
> > for failed_logins_allowed.
> 
> Why a GUC, can't we just use ALTER ROLE (or ALTER DATABASE)?

If you make it a GUC, you get those for free.  (That's what the "U"
means.)




В списке pgsql-hackers по дате отправления:

Предыдущее
От: Bernd Helmle
Дата:
Сообщение: Re: TODO item: Allow more complex user/database default GUC settings
Следующее
От: Magnus Hagander
Дата:
Сообщение: Re: Small patch for README