Re: Automatic upgrade of passwords from md5 to scram-sha256

Поиск
Список
Период
Сортировка
От Ron Johnson
Тема Re: Automatic upgrade of passwords from md5 to scram-sha256
Дата
Msg-id CANzqJaCuKWr+S8gR3WDFESnep=ogwcqhihSVD5w3BuvXk3GYSw@mail.gmail.com
обсуждение исходный текст
Ответ на Re: Automatic upgrade of passwords from md5 to scram-sha256  (Tom Lane <tgl@sss.pgh.pa.us>)
Список pgsql-general
On Mon, Jan 13, 2025 at 3:41 PM Peter J. Holzer <hjp-pgsql@hjp.at> wrote:
On 2025-01-13 12:19:06 -0500, Ron Johnson wrote:
> On Sun, Jan 12, 2025 at 5:59 PM Tom Lane <tgl@sss.pgh.pa.us> wrote:
>  [snip]
>
>     I think this idea is a nonstarter, TLS or not.  We're generally moving
>     in the direction of never letting the server see cleartext passwords.
>     It's already possible to configure libpq to refuse such requests
>     (see require_auth parameter), although that hasn't been made the
>     default.
>
>
> ALTER ROLE xxx WITH PASSWORD accepts hashed values, so a client with the
> SCRAM-SHA algorithm could:
> 1. remember the password that was just used to log in,
> 2. generate the new hash, 
> 3. send that as an ALTER ROLE statement.

Modifying the client to re-set the password is actually something I
thought about. There are some technical unknowns (e.g. is
PQencryptPasswordConn accessible through ODBC?) and some organisational
difficulties (e.g. can we get the customers to upgrade to the newest
version?), but I guess in our case it would be doable. But in general
changing every to client to upgrade the password doesn't seem feasible.
Unless maybe you are proposing that libpq should do that? That might
work, but it probably also shouldn't do it by default.

That seems to me to be the fastest way to get the feature out to users.  (JDBC would also need it.)

Then clients like psql, pgAdmin, etc would need to add those calls.

--
Death to <Redacted>, and butter sauce.
Don't boil me, I'm still alive.
<Redacted> lobster!

В списке pgsql-general по дате отправления: