Re: ODBC problem
От | Tom Lane |
---|---|
Тема | Re: ODBC problem |
Дата | |
Msg-id | 25669.971109936@sss.pgh.pa.us обсуждение исходный текст |
Ответ на | Re: ODBC problem (Peter Eisentraut <peter_e@gmx.net>) |
Ответы |
Re: ODBC problem - crypt..
|
Список | pgsql-interfaces |
Peter Eisentraut <peter_e@gmx.net> writes: > Tom Samplonius writes: >> Except for the fact that crypt provides little if no security increase. >> Even though only a crypted password is sent over the wire, that crypted >> password can still be captured off the wire and replayed to get access. > Only if you happen to get the same salt from the server every time, which > is rather unlikely. However, the standard crypt algorithm only has a small number of distinct salt values, so an attacker who's sniffed one login transaction can connect repeatedly until challenged with the same salt he saw used before. We have talked about adding a higher-security login protocol --- you can find past threads about this in the pghackers archive. IIRC a fairly complete design was worked out, but no one's got round to implementing it yet. There might still have been some unresolved objections, too. regards, tom lane
В списке pgsql-interfaces по дате отправления: