Re: Security WAS RE: [HACKERS] Updated TODO list

From: "Gene Sokolov" <hook(at)aktrad(dot)ru>
To: "Ansley, Michael" <Michael(dot)Ansley(at)intec(dot)co(dot)za>, <pgsql-hackers(at)postgreSQL(dot)org>
Subject: Re: Security WAS RE: [HACKERS] Updated TODO list
Date: 1999-07-16 08:18:36
Message-ID: 014201becf63$cd8b4140$0d8cdac3@aktrad.ru
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-hackers

From: Ansley, Michael <Michael(dot)Ansley(at)intec(dot)co(dot)za>
> I think the point is that you wouldn't, but the most important part is to
> get it off the wire. Let someone do that first, and then worry about what
> the administrator can see. One would hope that your administrator is more
> trustworthy than joe hacker out on the network.
> >> Why would you want to make it visible to anyone?
> >>
> >> Vince.
>
> As a user, I would be extremely concerned if I knew that my password was
> fairly transparent on the network, but less so if I knew that the wire was
> safe, although my admin could see it. First prize would, of course, be
> total secrecy.

I have no idea where this misconception came from, but it's just plain
incorrect. You can do both - store hashes instead of plaintext passwords and
send logins securely over the network. Yes, the current authentication
scheme does not allow for it. But it just means that the scheme is outdated.
There are plenty of good secure solutions. It's just a matter of choosing
one.

Gene Sokolov.

In response to

Browse pgsql-hackers by date

  From Date Subject
Next Message Ansley, Michael 1999-07-16 08:26:45 RE: Security WAS RE: [HACKERS] Updated TODO list
Previous Message Gene Sokolov 1999-07-16 08:10:36 Re: Password thread (was: Re: [HACKERS] Updated TODO list)