Re: [HACKERS] Letting the client choose the protocol to use during aSASL exchange
От | Simon Riggs |
---|---|
Тема | Re: [HACKERS] Letting the client choose the protocol to use during aSASL exchange |
Дата | |
Msg-id | CANP8+jKPq1TXVq17V9fdT-fJtb1u4tZeaK2SE66a9sL7Tt6nmA@mail.gmail.com обсуждение исходный текст |
Ответ на | Re: [HACKERS] Letting the client choose the protocol to use during a SASL exchange (Tom Lane <tgl@sss.pgh.pa.us>) |
Ответы |
Re: [HACKERS] Letting the client choose the protocol to use during aSASL exchange
|
Список | pgsql-hackers |
On 6 April 2017 at 16:05, Tom Lane <tgl@sss.pgh.pa.us> wrote: > Perhaps we could turn this around: have the client send (in the connection > request packet) a list of auth protocols it thinks it is able to handle. > (I'm envisioning this as being more or less fixed for any one version of > any one client, since it would basically mean "I have code to do X, Y, or > Z".) Then the server can pick one that is allowed by pg_hba.conf, +1 Much better plan. > or it > can just ignore the list and send what it wants anyway, probably leading > to client disconnect. It would need to follow one of the requested protocols, but mark the request as doomed. Otherwise we'd be revealing information. That's what SCRAM does now. Since the list is currently length one, we can add more later when we get a list potentially > 1. > We could avoid this being a protocol break by having the server's default > assumption being that the client can handle all pre-SCRAM auth protocols. +1 -- Simon Riggs http://www.2ndQuadrant.com/ PostgreSQL Development, 24x7 Support, Remote DBA, Training & Services
В списке pgsql-hackers по дате отправления: