From: | Stephen Frost <sfrost(at)snowman(dot)net> |
---|---|
To: | Bruce Momjian <bruce(at)momjian(dot)us> |
Cc: | Josh Berkus <josh(at)agliodbs(dot)com>, Alvaro Herrera <alvherre(at)2ndquadrant(dot)com>, PostgreSQL-development <pgsql-hackers(at)postgreSQL(dot)org> |
Subject: | Re: MD5 authentication needs help |
Date: | 2015-03-07 20:40:22 |
Message-ID: | 20150307204022.GN29780@tamriel.snowman.net |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-hackers |
* Bruce Momjian (bruce(at)momjian(dot)us) wrote:
> On Sat, Mar 7, 2015 at 03:15:46PM -0500, Bruce Momjian wrote:
> > > Gave me 9.15s, or ~0.00915s per connection on a single thread. That
> > > times 16k is 146s or about two and a half minutes. Of course, I'm
> > > comparing this against what we currently do since, well, that's what we
> > > currently do. Changing it to 4b would certainly improve that. Of
> > > course, using multiple threads, having multiple challenge/responses on
> > > hand (due to listening for a while) or simply breaking the MD5 hash
> > > (which we know isn't a terribly great hashing algorithm these days)
> > > would change that.
> >
> > Uh, my calculations show that as 434 days of trying. (Not sure why you
> > didn't bother doing that calculation.) I think anyone who is worried
> > about that level of attack would already be using MD5. Again, MD5 is
> > mostly used in low-security settings where you just don't want the
> > password sent over the wire in cleartext. Frankly, without TLS, you are
> > already sending your queries and data across in clear-text, and there
> > are other attack vectors.
>
> Actually, with a counter, the bad guy just has to wait for the counter
> to roll around, and then try to catch the counter on the values he has
> recorded, meaning you wouldn't even be able to detect the hack attempts.
> :-)
That's true, if the counter is at an individual-level. If it's cluster
wide then they aren't very likely to have the same counter for the same
individual after the wrap-around. Then again, what individual is going
to be logging in 4 billion times? There's a number of trade-offs here,
which is why we'd really be better off using an approach which security
folks have already vetted.
Thanks!
Stephen
From | Date | Subject | |
---|---|---|---|
Next Message | Stephen Frost | 2015-03-07 21:39:35 | Re: Additional role attributes && superuser review |
Previous Message | Bruce Momjian | 2015-03-07 20:32:40 | Re: MD5 authentication needs help |