Re: - Mailing list pgsql-hackers

From Michael Robinson
Subject Re:
Date
Msg-id 200005100448.MAA05543@netrinsics.com
Whole thread Raw
In response to  ("Ray Messier" <messier@nichewareinc.com>)
List pgsql-hackers
"Henry B. Hotz" <hotz@jpl.nasa.gov> writes:
>If I understand the original objection it's that passwords are stored 
>in cleartext on the postmaster machine.

You understand the original objection, but you don't understand the basis for
the objection.

>That's not much of an 
>objection since you have to have your secrets available in the clear 
>on both ends of a connection if you want the traffic on the 
>connection secured.

This is true.  However, the problem is that people reuse passwords.  By 
hashing the password on both ends of the connection with a known random 
salt, you achieve the same result as if people did not reuse passwords,
i.e., a root compromise of the postgres server will not give the perpetrator
access to anything other than the specific postgres account on that server.

Without encryption, such a compromise would very likely lead to further 
compromises of other services secured by the same password as was used for
postgres access.

Users are their own worst enemy.  This is a small thing we can do to protect
them from themselves.
-Michael



pgsql-hackers by date:

Previous
From: "Kaare Rasmussen"
Date:
Subject: Oops! Searching mailing lists...
Next
From: Malcolm Beattie
Date:
Subject: Re: pgsql/php3/apache authentication