Oliver Elphick wrote:
> On Tue, 2002-12-31 at 17:49, Bruce Momjian wrote:
> > Tom Lane wrote:
> > > Devrim GUNDUZ <[EMAIL PROTECTED]> writes:
> > > > Some guys from Turkey claim that they have a code to crack PostgreSQL
> > > > passwords, defined in pg_hba.conf .
> > >
> > > > http://www.core.gen.
On Tue, 2002-12-31 at 17:49, Bruce Momjian wrote:
> Tom Lane wrote:
> > Devrim GUNDUZ <[EMAIL PROTECTED]> writes:
> > > Some guys from Turkey claim that they have a code to crack PostgreSQL
> > > passwords, defined in pg_hba.conf .
> >
> > > http://www.core.gen.tr/pgcrack/
> >
> > This is not a c
I get it, mutual dependency because they are both droppable. Added to
TODO:
* Have DEFAULT dependency track use of sequence, for DROP DEFAULT check
---
Tom Lane wrote:
> Bruce Momjian <[EMAIL PROTECTED]> writes:
> >
Devrim GUNDUZ <[EMAIL PROTECTED]> writes:
> I had no time to search throug the code; but as far as I understood, it
> *attacks* the database servers with TCP/IP on, right?
No, the program itself simply takes an MD5 hash value and does a
brute-force search for a password that generates that MD5 str
Devrim GUNDUZ wrote:
> Hi,
>
> On Sal, 2002-12-31 at 19:38, Tom Lane wrote:
> >
> > This is not a cracker, this is just a brute-force "try all possible
> > passwords" search program (and a pretty simplistic one at that).
>
> Ah, you're right.
>
> > I'd say all this proves is the importance of ch
Tom Lane wrote:
> Devrim GUNDUZ <[EMAIL PROTECTED]> writes:
> > Some guys from Turkey claim that they have a code to crack PostgreSQL
> > passwords, defined in pg_hba.conf .
>
> > http://www.core.gen.tr/pgcrack/
>
> This is not a cracker, this is just a brute-force "try all possible
> passwords"
Hi,
On Sal, 2002-12-31 at 19:38, Tom Lane wrote:
>
> This is not a cracker, this is just a brute-force "try all possible
> passwords" search program (and a pretty simplistic one at that).
Ah, you're right.
> I'd say all this proves is the importance of choosing a good password.
> Using only lowe
Bruce Momjian <[EMAIL PROTECTED]> writes:
> Tom Lane wrote:
>> Bruce Momjian <[EMAIL PROTECTED]> writes:
>>> Seems this is already a TODO:
>>> * Have sequence dependency track use of DEFAULT sequences, seqname.nextval
>>
>> That's related but not the same issue.
> Related in that ALTER TABLE DROP
Devrim GUNDUZ <[EMAIL PROTECTED]> writes:
> Some guys from Turkey claim that they have a code to crack PostgreSQL
> passwords, defined in pg_hba.conf .
> http://www.core.gen.tr/pgcrack/
This is not a cracker, this is just a brute-force "try all possible
passwords" search program (and a pretty sim
Tom Lane wrote:
> Bruce Momjian <[EMAIL PROTECTED]> writes:
> > Seems this is already a TODO:
> > * Have sequence dependency track use of DEFAULT sequences, seqname.nextval
>
> That's related but not the same issue.
Related in that ALTER TABLE DROP DEFAULT _doesn't_ see a dependancy for
seque
This falls under the "better late then never" dept ... I would have
mentioned something sooner, but this sort of stuff generally goes through
the lists like wild-fire, and since it didn't this time, I wasn't sure how
valid it was ...
... but ...
... today I received the Linux New Media Editors C
Hi,
Some guys from Turkey claim that they have a code to crack PostgreSQL
passwords, defined in pg_hba.conf .
http://www.core.gen.tr/pgcrack/
Maybe some of you want to get the code...
Best regards,
--
Devrim GUNDUZ
www.gunduz.org
---(end of broadcast)
Bruce Momjian <[EMAIL PROTECTED]> writes:
> Seems this is already a TODO:
> * Have sequence dependency track use of DEFAULT sequences, seqname.nextval
That's related but not the same issue.
regards, tom lane
---(end of broadcast)-
Seems this is already a TODO:
* Have sequence dependency track use of DEFAULT sequences, seqname.nextval
---
Tom Lane wrote:
> Tara Piorkowski <[EMAIL PROTECTED]> writes:
> > Regardless, my thinking had been that I
14 matches
Mail list logo