Re: md5 auth procotol - can it be replayed?

From: Nagy László Zsolt <gandalf(at)shopzeus(dot)com>
To: Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us>, Stephen Frost <sfrost(at)snowman(dot)net>
Cc: pgsql-admin(at)postgresql(dot)org
Subject: Re: md5 auth procotol - can it be replayed?
Date: 2016-05-07 17:53:07
Message-ID: 572E2B83.10908@shopzeus.com
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-admin


>> There is a challenge/response compoent, so the md5 hash which is stored
>> is not what is sent across the wire. That prevents replay attacks when
>> the attacker is simply sniffing the network.
> Worth noting here is that the challenge key space is not all that huge,
> so an attacker who captures a large number of challenge/response pairs
> would have a good probability of being able to answer the next challenge
> successfully. However, if you're concerned about sniffing of your
> database connections happening on that scale, you really ought to be using
> SSL encryption which would make the whole thing moot. In many cases,
> capturing a database session would reveal lots of interesting data passing
> over the wire whether or not you'd captured a usable password --- so I'd
> call it fairly irresponsible to not be using SSL if you think your
> connection is open to sniffing.
Thank you for your responses, this is exactly what I was looking for.

In response to

Browse pgsql-admin by date

  From Date Subject
Next Message koff10 2016-05-07 22:18:35 postgres_fdw for porstgresql 9.2 installation
Previous Message Tom Lane 2016-05-07 16:28:37 Re: md5 auth procotol - can it be replayed?