Re: Rejecting weak passwords

Поиск
Список
Период
Сортировка
От Joshua D. Drake
Тема Re: Rejecting weak passwords
Дата
Msg-id 1254178785.32237.3.camel@jd-desktop.iso-8859-1.charter.com
обсуждение исходный текст
Ответ на Re: Rejecting weak passwords  (Josh Berkus <josh@agliodbs.com>)
Список pgsql-hackers
On Mon, 2009-09-28 at 15:52 -0700, Josh Berkus wrote:
> > It takes about 32 hours to brute force all passwords from [a-zA-Z0-9]
> > of up to 8 chars in length.
> 
> That would be a reason to limit the number of failed connection attempts
> from a single source, then, rather than a reason to change the hash
> function.
> 
> Hmmm, that would be a useful, easy (I think) security feature: add a GUC
> for failed_logins_allowed.

Why a GUC, can't we just use ALTER ROLE (or ALTER DATABASE)?

Joshua D. Drake


-- 
PostgreSQL.org Major Contributor
Command Prompt, Inc: http://www.commandprompt.com/ - 503.667.4564
Consulting, Training, Support, Custom Development, Engineering
If the world pushes look it in the eye and GRR. Then push back harder. - Salamander



В списке pgsql-hackers по дате отправления:

Предыдущее
От: Alvaro Herrera
Дата:
Сообщение: Re: [PATCH] 8.5 TODO: Add comments to output indicating version of pg_dump and of the database server
Следующее
От: "Albe Laurenz"
Дата:
Сообщение: Re: Rejecting weak passwords