Re: Rejecting weak passwords - Mailing list pgsql-hackers

From Andrew Dunstan
Subject Re: Rejecting weak passwords
Date
Msg-id 4AC14255.70207@dunslane.net
Whole thread Raw
In response to Re: Rejecting weak passwords  (Jeff Davis <pgsql@j-davis.com>)
List pgsql-hackers

Jeff Davis wrote:
> On Mon, 2009-09-28 at 15:52 -0700, Josh Berkus wrote:
>   
>>> It takes about 32 hours to brute force all passwords from [a-zA-Z0-9]
>>> of up to 8 chars in length.
>>>       
>> That would be a reason to limit the number of failed connection attempts
>> from a single source, then, rather than a reason to change the hash
>> function.
>>     
>
> That doesn't solve the problem of an administrator brute-forcing your password.
>
>
>
>   

Indeed. These brute force checkers aren't checking them by actually 
trying the connection.

cheers

andrew


pgsql-hackers by date:

Previous
From: Jeff Davis
Date:
Subject: Re: Rejecting weak passwords
Next
From: Tom Lane
Date:
Subject: Re: Rejecting weak passwords