Re: md5 again

From: Karel Zak <zakkr(at)zf(dot)jcu(dot)cz>
To: Vince Vielhaber <vev(at)michvhf(dot)com>
Cc: pgsql-hackers(at)postgreSQL(dot)org
Subject: Re: md5 again
Date: 2000-07-11 16:51:46
Message-ID: Pine.LNX.3.96.1000711184552.17539B-100000@ara.zf.jcu.cz
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-hackers

> If CL sends the MD5 of the username rather than the plaintext username,
> only CL and PG will know what the username is. PG will know it by
> comparing it with the MD5 of every username in pg_shadow. So even if the
> wire is being sniffed the unhashed username can be used in the password's
> encryption along with the salt sent by PG. This method will take longer
> for a user to log in, but the login process is only per session, not per
> SQL call.

But don't forget that some web application need fast log. And if is not
possible use persisten connection is necessary log for each access to web
page. (...etc.).

The log speed is keep tracked feature too.

Karel

In response to

  • md5 again at 2000-07-11 14:50:20 from Vince Vielhaber

Browse pgsql-hackers by date

  From Date Subject
Next Message Tom Lane 2000-07-11 16:52:50 Re: postmaster errors with index on temp table?
Previous Message Bruce Momjian 2000-07-11 16:51:28 Re: md5 again