Re: Rejecting weak passwords
От | Joshua D. Drake |
---|---|
Тема | Re: Rejecting weak passwords |
Дата | |
Msg-id | 1254178785.32237.3.camel@jd-desktop.unknown.charter.com обсуждение исходный текст |
Ответ на | Re: Rejecting weak passwords (Josh Berkus <josh@agliodbs.com>) |
Ответы |
Re: Rejecting weak passwords
|
Список | pgsql-hackers |
On Mon, 2009-09-28 at 15:52 -0700, Josh Berkus wrote: > > It takes about 32 hours to brute force all passwords from [a-zA-Z0-9] > > of up to 8 chars in length. > > That would be a reason to limit the number of failed connection attempts > from a single source, then, rather than a reason to change the hash > function. > > Hmmm, that would be a useful, easy (I think) security feature: add a GUC > for failed_logins_allowed. Why a GUC, can't we just use ALTER ROLE (or ALTER DATABASE)? Joshua D. Drake -- PostgreSQL.org Major Contributor Command Prompt, Inc: http://www.commandprompt.com/ - 503.667.4564 Consulting, Training, Support, Custom Development, Engineering If the world pushes look it in the eye and GRR. Then push back harder. - Salamander
В списке pgsql-hackers по дате отправления: