Re: You're on SecurityFocus.com for the cleartext passwords.

From: "Robert B(dot) Easter" <reaster(at)comptechnews(dot)com>
To: Andrew McMillan <Andrew(at)catalyst(dot)net(dot)nz>
Cc: pgsql-hackers(at)postgresql(dot)org
Subject: Re: You're on SecurityFocus.com for the cleartext passwords.
Date: 2000-05-07 14:37:28
Message-ID: 00050710572202.04750@comptechnews
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-general pgsql-hackers

On Sun, 07 May 2000, you wrote:
> So, if someone can see those hashes, why don't they just create
> themselves a new user, grant it full privileges to the database and
> play?

I know, they can do anything. But creating a new user is something very
obvious that the admin will see. The breach of security would be detectable.
If they can get in with the hashes, they can be very sneaky and it would take a
long time to detect. The cracker shouldn't able to compromise a current
users account without having to even change the password on it. Its better to
force the cracker have to create an account than to let him do bad things as
you whenever he wants. Would you like the feeling of never knowing that maybe
someone has your hash and is able to get in without you knowing? Your
password becomes useless. Really, sensitive information in the database could
be insecure over a long period of time and it would never be detectable. You'd
just have to change your password frequently to ensure that you are the only
one that can get in. Its better to make a security system where the alarm will
go off.

If your competitor is able to get into the database as you, because he got your
hash after hiring some cracker to get it, he can learn all your trade secrets
and always find a way to have the advantage. You and your company might have a
hard time figuring out whats going on because, so to speak, the security on the
database has no alarm.

I agree that the MD5 double hash solution fixes the immediate problem. Its
just not going to be a complete security solution.

--
Robert B. Easter
reaster(at)comptechnews(dot)com

In response to

Browse pgsql-general by date

  From Date Subject
Next Message Tom Lane 2000-05-07 15:28:40 Re: You're on SecurityFocus.com for the cleartext passwords.
Previous Message Bruce Momjian 2000-05-07 13:08:45 Re: So we're in agreement....

Browse pgsql-hackers by date

  From Date Subject
Next Message SAKAIDA Masaaki 2000-05-07 15:11:35 Re: client libpq multibyte support
Previous Message Bruce Momjian 2000-05-07 13:08:45 Re: So we're in agreement....