Re: You're on SecurityFocus.com for the cleartext passwords.

From: Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us>
To: "Robert B(dot) Easter" <reaster(at)comptechnews(dot)com>
Cc: teg(at)redhat(dot)com (Trond Eivind Glomsrd), Vince Vielhaber <vev(at)michvhf(dot)com>, Bruce Momjian <pgman(at)candle(dot)pha(dot)pa(dot)us>, The Hermit Hacker <scrappy(at)hub(dot)org>, "Sverre H(dot) Huseby" <sverrehu(at)online(dot)no>, pgsql-hackers(at)postgresql(dot)org
Subject: Re: You're on SecurityFocus.com for the cleartext passwords.
Date: 2000-05-06 18:55:42
Message-ID: 11317.957639342@sss.pgh.pa.us
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-general pgsql-hackers

"Robert B. Easter" <reaster(at)comptechnews(dot)com> writes:
> http://www.php.net/manual/function.crypt.php
> It explains that many systems have updated crypt() to use MD5 and how to
> check what hash algorithm your system's crypt() actually uses.

Oh, that's interesting. If that's correct, we *already* have a cross-
platform compatibility problem: a client compiled on a machine with
DES-derived crypt() will be unable to authenticate itself under "crypt"
protocol to a server using MD5-based crypt(), or vice versa, because the
wrong hashed password will be sent. Can someone with access to two such
machines check this?

If that's true, it seriously weakens the backwards-compatibility
argument for sticking with crypt(), IMHO. Old clients on another
platform may already fail to talk to your server...

regards, tom lane

In response to

Responses

Browse pgsql-general by date

  From Date Subject
Next Message Bruce Momjian 2000-05-06 18:57:38 Re: You're on SecurityFocus.com for the cleartext passwords.
Previous Message Bruce Momjian 2000-05-06 18:54:52 Re: You're on SecurityFocus.com for the cleartext passwords.

Browse pgsql-hackers by date

  From Date Subject
Next Message Bruce Momjian 2000-05-06 18:57:38 Re: You're on SecurityFocus.com for the cleartext passwords.
Previous Message Bruce Momjian 2000-05-06 18:54:52 Re: You're on SecurityFocus.com for the cleartext passwords.