Re: md5 again - Mailing list pgsql-hackers

From Karel Zak
Subject Re: md5 again
Date
Msg-id Pine.LNX.3.96.1000711184552.17539B-100000@ara.zf.jcu.cz
Whole thread Raw
In response to md5 again  (Vince Vielhaber <vev@michvhf.com>)
List pgsql-hackers
> If CL sends the MD5 of the username rather than the plaintext username,
> only CL and PG will know what the username is.  PG will know it by 
> comparing it with the MD5 of every username in pg_shadow. So even if the
> wire is being sniffed the unhashed username can be used in the password's
> encryption along with the salt sent by PG.  This method will take longer
> for a user to log in, but the login process is only per session, not per
> SQL call.  
But don't forget that some web application need fast log. And if is not
possible use persisten connection is necessary log for each access to web
page. (...etc.).
The log speed is keep tracked feature too. 
                    Karel                    



pgsql-hackers by date:

Previous
From: Bruce Momjian
Date:
Subject: Re: md5 again
Next
From: Bruce Momjian
Date:
Subject: Re: md5 again