BUG #15035: scram-sha-256 blocks all logins

From: "David G(dot) Johnston" <david(dot)g(dot)johnston(at)gmail(dot)com>
To: Meirav Rath <meirav(dot)rath(at)imperva(dot)com>
Cc: Tomas Vondra <tomas(dot)vondra(at)2ndquadrant(dot)com>, "pgsql-bugs(at)lists(dot)postgresql(dot)org" <pgsql-bugs(at)lists(dot)postgresql(dot)org>, PG Bug reporting form <noreply(at)postgresql(dot)org>
Subject: BUG #15035: scram-sha-256 blocks all logins
Date: 2018-01-30 04:37:53
Message-ID: CAKFQuwbthtxsDcf1YqYO4JiC3KeoejeuJsfWk6pFaSpauHAoaA@mail.gmail.com
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-bugs

On Monday, January 29, 2018, Meirav Rath <meirav(dot)rath(at)imperva(dot)com> wrote:

> I set up the password hashing method to scram and now no one can login to
> the server and that's not a bug??
>

If we understand the problem correctly, no, it's not a bug: changing the
password type setting after deployment requires some work to change
pre-existing roles. It is not possible for the server to do it for you, the
passwords being encrypted.

I think the short answer is to setup pg_hba.conf so you can get a superuser
login without a password (peer or trust) and then alter the superuser
password and create/alter any users you want with new password in scram
format.

David J.

In response to

Responses

Browse pgsql-bugs by date

  From Date Subject
Next Message Tom Lane 2018-01-30 04:40:53 Re: BUG #15035: scram-sha-256 blocks all logins
Previous Message Meirav Rath 2018-01-30 04:12:37 Re: BUG #15035: scram-sha-256 blocks all logins