On Thu, Dec 27, 2012 at 5:39 PM, Peter Bex <peter....@xs4all.nl> wrote:
> On Thu, Dec 27, 2012 at 12:31:08PM -0300, Claudio Freire wrote:
>> On Thu, Dec 27, 2012 at 11:46 AM, Peter Bex <peter....@xs4all.nl> wrote:
>> >
>> > Implementing a more secure challenge-response based algorithm means
>> > a change in the client-server protocol.  Perhaps something like SCRAM
>> > (maybe through SASL) really is the way forward for this, but that
>> > seems like quite a project and it seems to dictate how the passwords are
>> > stored; it requires a hash of the PBKDF2 algorithm to be stored.
>>
>> It would be nonsense to do it in any other way... protecting the
>> password store and not the exchange would just shift the weak spot.
>
> Yeah, that's why I was being rather pessimistic about the patch I posted.
> However, SCRAM will only protect the password; SSL is still required
> to protect against connection hijacking.
>
The thread that ended with
http://archives.postgresql.org/message-id/5086cb7a.5040...@gmx.net
also tended towards SASL and SCRAM as the best direction for
developing password and GSSAPI/Kerberos authentication.


-- 
Sent via pgsql-hackers mailing list (pgsql-hackers@postgresql.org)
To make changes to your subscription:
http://www.postgresql.org/mailpref/pgsql-hackers

Reply via email to