From: | Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us> |
---|---|
To: | Bruce Momjian <pgman(at)candle(dot)pha(dot)pa(dot)us>, Vince Vielhaber <vev(at)michvhf(dot)com>, The Hermit Hacker <scrappy(at)hub(dot)org>, "Sverre H(dot) Huseby" <sverrehu(at)online(dot)no>, pgsql-hackers(at)postgresql(dot)org |
Subject: | Re: You're on SecurityFocus.com for the cleartext passwords. |
Date: | 2000-05-06 18:14:13 |
Message-ID: | 10878.957636853@sss.pgh.pa.us |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-general pgsql-hackers |
I said:
> I think we should try to stick to the current protocol: one salt sent
> by the server, one crypted password sent back. The costs of changing
> the protocol will probably outweigh any real-world security gain.
Actually, since libpq handles the authentication phase of connection
via a state-machine, it'd be possible for the postmaster to send two
successive authentication challenge packets with different salts, and
libpq would respond correctly to each one. This is a little bit shaky
because the current protocol document does not say that clients should
loop at the challenge point of the protocol, so there might be non-libpq
clients that wouldn't cope. But it's possible we could do it without
breaking compatibility with old clients.
However, I still fail to see what it buys us to challenge the frontend
with two salts. If the password is stored crypted, the *only* thing
we can validate is that password with the same salt it was stored
with. It doesn't sound like MD5 changes this at all.
regards, tom lane
From | Date | Subject | |
---|---|---|---|
Next Message | Benjamin Adida | 2000-05-06 18:21:10 | Re: You're on SecurityFocus.com for the cleartext passwords. |
Previous Message | Gustavo Henrique | 2000-05-06 17:54:59 | performance |
From | Date | Subject | |
---|---|---|---|
Next Message | Benjamin Adida | 2000-05-06 18:21:10 | Re: You're on SecurityFocus.com for the cleartext passwords. |
Previous Message | Bruce Momjian | 2000-05-06 17:30:24 | Re: You're on SecurityFocus.com for the cleartext passwords. |