Re: Log of CREATE USER statement

From: Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us>
To: Bruce Momjian <pgman(at)candle(dot)pha(dot)pa(dot)us>
Cc: Peter Eisentraut <peter_e(at)gmx(dot)net>, pgsql-hackers(at)postgresql(dot)org, Ricardo Vaz - TCESP <jrvaz(at)tce(dot)sp(dot)gov(dot)br>
Subject: Re: Log of CREATE USER statement
Date: 2005-12-09 19:07:43
Message-ID: 444.1134155263@sss.pgh.pa.us
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-hackers

Bruce Momjian <pgman(at)candle(dot)pha(dot)pa(dot)us> writes:
> Tom Lane wrote:
>> As I said already, if the user wishes the password to be secure, he
>> needs to encrypt it on the client side. Anything else is just the
>> illusion of security.

> Thinking some more, does encoding on the client side really improve
> things? It hides the user-typed password from prying eyes, but it
> doesn't prevent someone from using that md5 string to get into the
> database.

That's not the point --- anyone who can look at the md5 string is
already into the database. The threat that (I suppose) the OP is
worried about is that the user might use the same cleartext password
for other things, which means that someone who is able to swipe his
cleartext password might be able to get into those other services.
But the md5 password will not give enough information for that.

regards, tom lane

Browse pgsql-hackers by date

  From Date Subject
Next Message Tom Lane 2005-12-09 19:08:55 Re: Min Xid problem proposal
Previous Message Alvaro Herrera 2005-12-09 18:57:22 Re: Min Xid problem proposal