Re: Spoofing as the postmaster - Mailing list pgsql-hackers

From Tom Lane
Subject Re: Spoofing as the postmaster
Date
Msg-id 3877.1198859849@sss.pgh.pa.us
Whole thread Raw
In response to Re: Spoofing as the postmaster  ("Trevor Talbot" <quension@gmail.com>)
Responses Re: Spoofing as the postmaster  ("Trevor Talbot" <quension@gmail.com>)
List pgsql-hackers
"Trevor Talbot" <quension@gmail.com> writes:
> There's a fundamental problem that you can't make someone else do
> authentication if they don't want to, and that's exactly the situation
> clients are in. I don't see how this can possibly be fixed anywhere
> other than the client.

The point of requiring authentication from the server side is that it
will get people to configure their client code properly.  Then if a MITM
attack is subsequently attempted, the client code will detect it.

It's true that this doesn't offer much defense in the case where a new
user is getting set up and a MITM attack is already active.  But a user
who blindly trusts a server that he's never connected to before is open
to all sorts of attacks, starting for instance with mistyping the host
name.  The fact that this approach doesn't (by itself) solve that
problem doesn't make it useless.

Also, getting people in the habit of setting up for mutual
authentication does have value in that scenario too; it makes the new
user perhaps a bit more likely to distrust a server that isn't
presenting the right certificate.
        regards, tom lane


pgsql-hackers by date:

Previous
From: "Trevor Talbot"
Date:
Subject: Re: Spoofing as the postmaster
Next
From: Tom Lane
Date:
Subject: Re: Selectivity estimation for equality and range queries