Re: PostgreSQL cleartext passwords - Mailing list pgsql-general

From Mike Mascari
Subject Re: PostgreSQL cleartext passwords
Date
Msg-id 3924774C.35B451D7@mascari.com
Whole thread Raw
In response to Re: initdb and "exit_nicely"  (Paul Condon <pecondon@quiknet.com>)
List pgsql-general
Tom Lane wrote:
>
> Jim Mercer <jim@reptiles.org> writes:
> > by default, the passwords are stored in clear text.
> > however, if you are configuring passwords, then likely you are going
> > to need to change settings in pg_hba.conf. in there you can specify
> > "crypt", and the system will expect that the passwds in pg_shadow
> > are encrypted.
>
> Not so!  "crypt" authentication provides for sending passwords in
> crypted form during login (which is good if you're afraid of password-
> sniffers, but then maybe you should be using SSL to protect your whole
> session, not only the password).  But it doesn't change the contents
> of pg_shadow.

...

>
> BTW, there is no particularly good reason to be storing passwords in
> the Postgres database at all --- you can instead use Kerberos
> authentication, or perhaps "ident" authentication (though ident is
> only OK if logins are only accepted from machines whose sysadmins you
> trust, since ident is easily faked on an insecure machine).
>
>                         regards, tom lane

Unfortunately for those depending on Kerberos, a CERT advisory
was released just yesterday:

CERT Advisory CA-2000-06 Multiple Buffer Overflows in Kerberos
Authenticated Services

   Original release date: May 17, 2000
   Last revised: --
   Source: The MIT Kerberos Team, CERT/CC

   A complete revision history is at the end of this file.

Systems Affected

     * Systems running services authenticated via Kerberos 4
     * Some systems running services authenticated via Kerberos 5
     * Systems running the Kerberized remote shell daemon (krshd)
     * Systems with the Kerberos 5 ksu utility installed
     * Systems with the Kerberos 5 v4rcp utility installed

Overview

   The CERT Coordination Center has recently been notified of
several
   buffer overflow vulnerabilities in the Kerberos authentication
   software. The most severe vulnerability allows remote
intruders to
   gain root privileges on systems running services using
Kerberos
   authentication. If vulnerable services are enabled on the Key
   Distribution Center (KDC) system, the entire Kerberos domain
may be
   compromised.

...

Mike Mascari

pgsql-general by date:

Previous
From: Peter Eisentraut
Date:
Subject: Re: initdb and "exit_nicely"...
Next
From: Peter Eisentraut
Date:
Subject: Re: Question about databases in alternate locations...