From: | Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us> |
---|---|
To: | Bruce Momjian <pgman(at)candle(dot)pha(dot)pa(dot)us> |
Cc: | Vince Vielhaber <vev(at)michvhf(dot)com>, The Hermit Hacker <scrappy(at)hub(dot)org>, "Sverre H(dot) Huseby" <sverrehu(at)online(dot)no>, pgsql-hackers(at)postgresql(dot)org |
Subject: | Re: You're on SecurityFocus.com for the cleartext passwords. |
Date: | 2000-05-06 21:57:10 |
Message-ID: | 12100.957650230@sss.pgh.pa.us |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-general pgsql-hackers |
Bruce Momjian <pgman(at)candle(dot)pha(dot)pa(dot)us> writes:
> Another idea is to add code to 7.1 to convert non-md5 shadow password
> fields to md5 format. Since we already have special handling to do
> pg_pwd, we could do it there. Seems like a plan. MD5 format is all
> hex digits of a specific length. No way to get that confused with a
> real password.
Well, if you're willing to depend on that, then there's no need for the
WITH ENCRYPTED PASSWORD variant syntax: the existing syntax WITH
PASSWORD could do it all, just by checking to see if the supplied
password string looks like it's already been md5-ified.
The real trick would be to get this to happen during a COPY into
pg_shadow --- if we did that, then dumps generated by 7.0 pg_dumpall
would still work. Perhaps a trigger on pg_shadow insert/update is
the right place to check and md5-ify the password? (If that's in place
then neither CREATE nor ALTER USER would need to do anything special!)
regards, tom lane
From | Date | Subject | |
---|---|---|---|
Next Message | Tom Lane | 2000-05-06 22:02:07 | Re: You're on SecurityFocus.com for the cleartext passwords. |
Previous Message | Benjamin Adida | 2000-05-06 21:50:46 | Re: You're on SecurityFocus.com for the cleartext passwords. |
From | Date | Subject | |
---|---|---|---|
Next Message | Tom Lane | 2000-05-06 22:02:07 | Re: You're on SecurityFocus.com for the cleartext passwords. |
Previous Message | Benjamin Adida | 2000-05-06 21:50:46 | Re: You're on SecurityFocus.com for the cleartext passwords. |