| From: | brian <brian(at)zijn-digital(dot)com> |
|---|---|
| To: | pgsql-general(at)postgresql(dot)org |
| Subject: | Re: Connect to postgres from a dynamic IP |
| Date: | 2008-03-04 03:15:11 |
| Message-ID: | 47CCBEBF.1010903@zijn-digital.com |
| Views: | Whole Thread | Raw Message | Download mbox | Resend email |
| Thread: | |
| Lists: | pgsql-general |
Jorge Godoy wrote:
> Em Monday 03 March 2008 13:17:03 você escreveu:
>> My understanding is no password is sent in the clear with md5 per:
>>
>> http://www.postgresql.org/docs/8.3/interactive/auth-methods.html#AUTH-PASSW
>> ORD
>
> But the MD5 hash is. This page states that the password can't be directly
> sniffed, but one can still get the hash of the password and perform a
> dictionary attack against it on a local copy (i.e., without ever trying to
> connect to the server).
>
> After a successful attack then one can connect directly to the server as if
> the password was known to him/her.
>
No sense in pretending. I should think that password *would* be known in
that scenario.
(ignoring hash collisions, of course)
| From | Date | Subject | |
|---|---|---|---|
| Next Message | Brendan Jurd | 2008-03-04 03:15:53 | Re: [GENERAL] Empty arrays with ARRAY[] |
| Previous Message | Jorge Godoy | 2008-03-04 02:41:50 | Re: Connect to postgres from a dynamic IP |