Re: You're on SecurityFocus.com for the cleartext passwords.

Поиск
Список
Период
Сортировка
От Robert B. Easter
Тема Re: You're on SecurityFocus.com for the cleartext passwords.
Дата
Msg-id 00050700040600.04750@comptechnews
обсуждение исходный текст
Ответ на Re: You're on SecurityFocus.com for the cleartext passwords.  (Benjamin Adida <ben@mit.edu>)
Ответы Re: You're on SecurityFocus.com for the cleartext passwords.  (Bruce Momjian <pgman@candle.pha.pa.us>)
Список pgsql-hackers
On Sat, 06 May 2000, Benjamin Adida wrote:
> on 5/6/00 2:14 PM, Tom Lane at tgl@sss.pgh.pa.us wrote:
> 
> > However, I still fail to see what it buys us to challenge the frontend
> > with two salts.  If the password is stored crypted, the *only* thing
> > we can validate is that password with the same salt it was stored
> > with.  It doesn't sound like MD5 changes this at all.
> 
> The MD5 definitely doesn't change anything except overall security strength
> of the algorithm. The additional random salt prevents someone from sniffing
> the communication between client and server and then simply log in by
> sending the known hash of the password. The challenge-response means that
> sniffing one login doesn't allow you to fake the next one.
> 
> -Ben

I see.  This protects the hash, which is an effective password, from being
gotten by sniffers.  But a cracker who has stolen the hashes out of Postgres can
still get in no matter what until you change the passwords.

I guess hashed password authentication is really not designed for use over an
untrusted connection.  You get the hash becomes effective password problem. 
Its very important that the hashed passwords stored in Postgres cannot be read
by anyone except the Postgres superuser.

I'm I getting this right?

Crypto 101 - I'm learning. :)
-- 
Robert B. Easter
reaster@comptechnews.com


В списке pgsql-hackers по дате отправления:

Предыдущее
От: Bruce Momjian
Дата:
Сообщение: Re: So we're in agreement....
Следующее
От: Tom Lane
Дата:
Сообщение: Re: So we're in agreement....