Re: [HACKERS] Updated TODO list
| От | Peter Eisentraut |
|---|---|
| Тема | Re: [HACKERS] Updated TODO list |
| Дата | |
| Msg-id | Pine.LNX.4.10.9907140959560.6097-100000@saxony.pathwaynet.com обсуждение исходный текст |
| Ответ на | Re: [HACKERS] Updated TODO list (wieck@debis.com (Jan Wieck)) |
| Список | pgsql-hackers |
> I think the original point was that some people use the same or related > passwords for psql as for their login password. Well, you can't expect the pedestrians out here to remember to different passwords. The fact that pgsql passwords are all lowercase makes this kind of tough though. So, then you have the option of storing passwords in plain readable to the db admin, which is unacceptable, or storing no password at all which leaves you with ident. Also, when you use things like PHP or run scripts/programs from cron, you can't really have people enter a password. Hardcoding passwords seems to be suggested by a lot of people, but that's ridiculous. I think what many people discussed about separating the authentication method into a compile-time option would be a good idea. Then the admin can decide whether to use the current system, SSL, ssh(?), PAM, whatever. Perhaps that would also take some load of the developers who would probably much rather develop a DBMS than authentication systems. I've posted this a while ago on one of the general lists, about whether there is a PAM-enabling patch available, but evidently I got the answer here. :( -- Peter Eisentraut PathWay Computing, Inc.
В списке pgsql-hackers по дате отправления: