Re: md5 again - Mailing list pgsql-hackers

From Vince Vielhaber
Subject Re: md5 again
Date
Msg-id Pine.BSF.4.21.0007111254260.97059-100000@paprika.michvhf.com
Whole thread Raw
In response to Re: md5 again  (Bruce Momjian <pgman@candle.pha.pa.us>)
Responses Re: md5 again  (Tom Lane <tgl@sss.pgh.pa.us>)
Re: md5 again  (Bruce Momjian <pgman@candle.pha.pa.us>)
List pgsql-hackers
On Tue, 11 Jul 2000, Bruce Momjian wrote:

> > > > If CL sends the MD5 of the username rather than the plaintext username,
> > > > only CL and PG will know what the username is.  PG will know it by 
> > > > comparing it with the MD5 of every username in pg_shadow. So even if the
> > > > wire is being sniffed the unhashed username can be used in the password's
> > > > encryption along with the salt sent by PG.  This method will take longer
> > > > for a user to log in, but the login process is only per session, not per
> > > > SQL call.  
> > > 
> > > A linear search of pg_shadow to log in is not acceptable; we don't want
> > > to make login any slower than we have to.  I see no real gain in security
> > > from doing this anyway...
> > 
> > By knowing what PG will do with the username and random salt, sniffing 
> > the wire can make guessing the password trivial.  If the username was
> > never sent over the wire in the clear the unhashed username is an unknown
> > salt to he who is sniffing.  But it's true that it would introduce a
> > slower than necessary login.
> > 
> 
> Does it?  I thought it was the password being run through MD5 that made
> it secure.

Simple dictionary passwords.  Run them thru a script and compare the 
output.  

Vince.
-- 
==========================================================================
Vince Vielhaber -- KA8CSH    email: vev@michvhf.com    http://www.pop4.net128K ISDN from $22.00/mo - 56K Dialup from
$16.00/moat Pop4 Networking       Online Campground Directory    http://www.camping-usa.com      Online Giftshop
Superstore   http://www.cloudninegifts.com
 
==========================================================================





pgsql-hackers by date:

Previous
From: Tom Lane
Date:
Subject: Re: postmaster errors with index on temp table?
Next
From: Tom Lane
Date:
Subject: Re: md5 again