Re: You're on SecurityFocus.com for the cleartext passwords.

From: Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us>
To: Bruce Momjian <pgman(at)candle(dot)pha(dot)pa(dot)us>
Cc: Benjamin Adida <ben(at)mit(dot)edu>, Vince Vielhaber <vev(at)michvhf(dot)com>, The Hermit Hacker <scrappy(at)hub(dot)org>, "Sverre H(dot) Huseby" <sverrehu(at)online(dot)no>, pgsql-hackers(at)postgresql(dot)org
Subject: Re: You're on SecurityFocus.com for the cleartext passwords.
Date: 2000-05-06 19:06:53
Message-ID: 11408.957640013@sss.pgh.pa.us
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-general pgsql-hackers

Bruce Momjian <pgman(at)candle(dot)pha(dot)pa(dot)us> writes:
>> Probably the way to attack this would be to combine MD5 and this double
>> password-munging algorithm as a new authentication protocol type to add
>> to the ones we already support. That way old clients don't have to be
>> updated instantly.

> Not sure that will work because once we use md5 on the server side for
> pg_shadow, we have to be able to do md5 on the client, I think, for
> crypting because the md5 has to be done _before_ the random salt crypt.

We can still support old clients under the cleartext-password protocol:
client sends password in clear, server MD5's it using salt from
pg_shadow and compares result. This is vulnerable to sniffing but no
more so than it was before. What we would lose is backwards
compatibility to the crypt-password protocol. We should still choose
a new Authentication typecode for the MD5/double-hash protocol, just to
make sure no one gets confused about which protocol is being requested.

If these reports are correct that some platforms already have MD5, not
DES, inside crypt(3) then I'm definitely leaning towards going with MD5.
The best reason to stick with crypt as the hash engine would be to
preserve support for the existing crypt-based protocol, but if that's
already broken cross-platform then the value of continuing to support it
looks pretty dubious. (After all, the clients on your own box are
probably getting updated at the same time as the server --- it's clients
on other boxes that you're really worried about backwards compatibility
for.)

regards, tom lane

In response to

Responses

Browse pgsql-general by date

  From Date Subject
Next Message Robert B. Easter 2000-05-06 19:18:35 Re: You're on SecurityFocus.com for the cleartext passwords.
Previous Message Bruce Momjian 2000-05-06 18:57:38 Re: You're on SecurityFocus.com for the cleartext passwords.

Browse pgsql-hackers by date

  From Date Subject
Next Message Robert B. Easter 2000-05-06 19:18:35 Re: You're on SecurityFocus.com for the cleartext passwords.
Previous Message Bruce Momjian 2000-05-06 18:57:38 Re: You're on SecurityFocus.com for the cleartext passwords.