Re: You're on SecurityFocus.com for the cleartext passwords.

Поиск
Список
Период
Сортировка
От Bruce Momjian
Тема Re: You're on SecurityFocus.com for the cleartext passwords.
Дата
Msg-id 200005070417.AAA03040@candle.pha.pa.us
обсуждение исходный текст
Ответ на Re: You're on SecurityFocus.com for the cleartext passwords.  ("Robert B. Easter" <reaster@comptechnews.com>)
Ответы Re: You're on SecurityFocus.com for the cleartext passwords.  (Tom Lane <tgl@sss.pgh.pa.us>)
Список pgsql-hackers
> I see.  This protects the hash, which is an effective password, from being
> gotten by sniffers.  But a cracker who has stolen the hashes out of Postgres can
> still get in no matter what until you change the passwords.
> 
> I guess hashed password authentication is really not designed for use over an
> untrusted connection.  You get the hash becomes effective password problem. 
> Its very important that the hashed passwords stored in Postgres cannot be read
> by anyone except the Postgres superuser.
> 
> I'm I getting this right?

Good point.  Though they can't see the original password, they can have
a pgsql client use it to connect to the database.

Anyone have a fix for that one?

--  Bruce Momjian                        |  http://www.op.net/~candle pgman@candle.pha.pa.us               |  (610)
853-3000+  If your life is a hard drive,     |  830 Blythe Avenue +  Christ can be your backup.        |  Drexel Hill,
Pennsylvania19026
 


В списке pgsql-hackers по дате отправления:

Предыдущее
От: Vince Vielhaber
Дата:
Сообщение: Re: So we're in agreement....
Следующее
От: Tom Lane
Дата:
Сообщение: Re: You're on SecurityFocus.com for the cleartext passwords.