From: | Bruno Wolff III <bruno(at)wolff(dot)to> |
---|---|
To: | Wim Bertels <wim(dot)bertels(at)khleuven(dot)be> |
Cc: | pgsql-admin(at)postgresql(dot)org |
Subject: | Re: brute force attacking the password |
Date: | 2005-04-19 20:37:27 |
Message-ID: | 20050419203727.GA18200@wolff.to |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-admin |
On Tue, Apr 19, 2005 at 17:00:15 +0200,
Wim Bertels <wim(dot)bertels(at)khleuven(dot)be> wrote:
> >Can't people use PAM to get this effect if they want it?
>
> what if u use pam with ldap, then u can use pg brute force cracking to
> obtain the ldap password, which is probably a bigger problem
You don't have to use it with LDAP. It does provide some password controls,
that should slow things down a little. However, you are going to have a
tough time preventing password guessing without making denial of service
attacks easy.
>
> >For most people password guessing isn't going to be a big problem as
> >the database won't be accessible from totally untrusted places and watching
> >the log files for guessing will probably be a good enough solution.
>
> what if u do want the database to be globally accessible..
Then you have a much more difficult situation. One option is to bind
user names to specific allowed IP addresses.
From | Date | Subject | |
---|---|---|---|
Next Message | Alvaro Herrera | 2005-04-19 20:46:14 | Re: |
Previous Message | Zuoxin.Wang | 2005-04-19 20:27:09 |