Re: So we're in agreement....

From: Benjamin Adida <ben(at)mit(dot)edu>
To: Philip Warner <pjw(at)rhyme(dot)com(dot)au>, Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us>, Vince Vielhaber <vev(at)michvhf(dot)com>
Cc: Bruce Momjian <pgman(at)candle(dot)pha(dot)pa(dot)us>, Hannu Krosing <hannu(at)tm(dot)ee>, The Hermit Hacker <scrappy(at)hub(dot)org>, "Sverre H(dot) Huseby" <sverrehu(at)online(dot)no>, <pgsql-hackers(at)postgresql(dot)org>
Subject: Re: So we're in agreement....
Date: 2000-05-08 15:59:10
Message-ID: B53C5C8E.3891%ben@mit.edu
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-general pgsql-hackers

on 5/8/00 11:38 AM, Philip Warner at pjw(at)rhyme(dot)com(dot)au wrote:

> I may well have missed something here, but it seems to me that the above
> scheme is also not particularly secure since someone who has managed to get
> access to the pg_shadow file will be able to fake a login by using a custom
> client. ie:

Yes, absolutely, but someone who gets the pg_shadow file can also alter the
database however he/she wants. The protocol defined prevents any knowledge
gained from sniffing, and prevents discovery of plaintext passwords from
looking at pg_shadow.

However, it does not prevent logins, as you mention, because once you have
the pg_shadow file, you've got everything anyways.

-Ben

In response to

Browse pgsql-general by date

  From Date Subject
Next Message Tom Lane 2000-05-08 16:02:30 Re: So we're in agreement....
Previous Message Hiroshi Inoue 2000-05-08 15:47:38 RE: Recovering data from binary files?

Browse pgsql-hackers by date

  From Date Subject
Next Message Tom Lane 2000-05-08 16:02:30 Re: So we're in agreement....
Previous Message Trond Eivind=?iso-8859-1?q?_Glomsr=F8d?= 2000-05-08 15:47:46 Re: Re: Ready to release?