Re: brute force attacking the password

Поиск
Список
Период
Сортировка
От Bruno Wolff III
Тема Re: brute force attacking the password
Дата
Msg-id 20050420152044.GB512@wolff.to
обсуждение исходный текст
Ответ на Re: brute force attacking the password  (Wim Bertels <wim.bertels@khleuven.be>)
Ответы Re: brute force attacking the password  (Wim Bertels <wim.bertels@khleuven.be>)
Re: brute force attacking the password  (Enrico Weigelt <weigelt@metux.de>)
Список pgsql-admin
On Tue, Apr 19, 2005 at 22:54:32 +0200,
  Wim Bertels <wim.bertels@khleuven.be> wrote:
>
> not an easy problem: it always seems to end up in DoS vs Brute Force Cracking.
> So the only good and simple solution i can think of: use the best possible
> password encrytion (or sufficient, a statistically zero chance when trying as
> much connections -to brute force crack the password- as possible for a
> significant amount of time.)

Maybe you can use client side certificates. Those will be from a large
enough space that guessing shouldn't be a problem. You should be able to
make that work with PAM.

В списке pgsql-admin по дате отправления:

Предыдущее
От: "Askar Zaidi"
Дата:
Сообщение: pgcluster usage??
Следующее
От: Michael Fuhr
Дата:
Сообщение: Re: Troubleshooting Postgres7.4