Re: [HACKERS] Enhancements to passwordcheck
От | Alvaro Herrera |
---|---|
Тема | Re: [HACKERS] Enhancements to passwordcheck |
Дата | |
Msg-id | 20170927150649.mws6xds44jnp4no4@alvherre.pgsql обсуждение исходный текст |
Ответ на | Re: [HACKERS] Enhancements to passwordcheck ("Bossart, Nathan" <bossartn@amazon.com>) |
Ответы |
Re: [HACKERS] Enhancements to passwordcheck
|
Список | pgsql-hackers |
Bossart, Nathan wrote: > On 9/27/17, 7:41 AM, "Peter Eisentraut" <peter.eisentraut@2ndquadrant.com> wrote: > > On 9/25/17 23:10, Bossart, Nathan wrote: > >> One interesting design challenge will be how to handle pre-hashed > >> passwords, since the number of checks we can do on those is pretty > >> limited. I'm currently thinking of a parameter that can be used to > >> block, allow, or force pre-hashed passwords. > > > > Pre-hashed passwords are the normal case. You can't break that without > > making this module a net loss in security. > > A strength in making this configurable is that you could use it to > enforce that passwords are pre-hashed. But yes, blocking pre- > hashed passwords could be undesirable given an untrusted network or > server. I think a password strength check must live at the end that does the encryption -- something like in psql when you do the \password command, *before* the encrypted password is sent to the server. Then you can do all sort of stuff (... except check for password history). I think the passwordcheck module as a whole is a dead end, security- wise. Myself, I've never seen the point in it. It runs at the wrong time, and there's no way to fix that. -- Álvaro Herrera https://www.2ndQuadrant.com/ PostgreSQL Development, 24x7 Support, Remote DBA, Training & Services -- Sent via pgsql-hackers mailing list (pgsql-hackers@postgresql.org) To make changes to your subscription: http://www.postgresql.org/mailpref/pgsql-hackers
В списке pgsql-hackers по дате отправления: