Re: sslmode=require fallback - Mailing list pgsql-hackers

From Greg Stark
Subject Re: sslmode=require fallback
Date
Msg-id CAM-w4HP6bCzme1nF8wRH-QBT75LfsA0xmcmaWDQZhN4zjCqkzQ@mail.gmail.com
Whole thread Raw
In response to Re: sslmode=require fallback  (Bruce Momjian <bruce@momjian.us>)
List pgsql-hackers
On Fri, Jul 29, 2016 at 4:13 PM, Bruce Momjian <bruce@momjian.us> wrote:
> Yes, I am thinking of a case where Postgres is down but a malevolent
> user starts a Postgres server on 5432 to gather passwords.

Or someone spoofs your DNS lookup, which is an attack that can
actually be done remotely in some cases.

For what it's worth the SCRAM work also addresses precisely this
danger though it doesn't prevent the attacker from pretending to be a
real server and capturing private data from the SQL updates.

Even in the case where there's no known server certificate it could
save the fingerprint seen once and require it not change. This proves
to be a headache to manage though. It's equivalent to the SSH
known_hosts scheme. How many times have you seen that warning message
and just automatically removed the entry in known_hosts without
verifying...

One day DNSSEC will solve all these problems though. Then you'll just
store the certificate in the DNS entry for the server and the client
will insist it match.

-- 
greg



pgsql-hackers by date:

Previous
From: Stephen Frost
Date:
Subject: Re: pg_dumping extensions having sequences with 9.6beta3
Next
From: Michael Paquier
Date:
Subject: Re: [sqlsmith] Failed assertion in joinrels.c