Hi Stephen,

* Stephen Frost <sfr...@snowman.net> [04/03/2015 01:45:56] wrote:
> Aaron,
> 
> * Aaron Zauner (a...@azet.org) wrote:
> > Debian ships a set of Perl scripts to configure for PostgreSQL server
> > configurations, these are quite outdated and are currently configuring
> > authentication to use MD5 when 'password' should be used instead.
> 
> Uh, no, using 'password' is far worse, and uniformly so, than using md5.
> I have no idea why anyone would think it's better to store a cleartext
> version of your password in the pg_authid data (note that pg_shadow is
> only a view now, I replaced it long ago when I rewrote the user/group
> system to be role-based).
> 

I assumed 'password' is an alias for a stronger hashing scheme. Mea
culpa, I should have read the source-code, not only the package
content and upstream defaults. I was not aware that 'password' is
indeed 'plaintext'.

> Absolutely no would be the answer. 

Given your explaination I totally agree here. I'm good to close this
- but let's wait if mik replies to this as well.

> The PG community has long been discussing the possibility of providing a
> new authentication mechanism to replace the md5 one, but anyone who
> actually cares about security will be using Kerberos or Certificate
> based authentication anyway, so it hasn't been a priority.

Agreed - most enterprise or cloud deployment I've been involved with
use either PKIX or kerberos. This is a good security measure.
Replacing MD5 would be nice as well (scrypt, bcrypt?). But I guess a
debian bug report is the wrong place to discuss this.

Thanks for clearing this up & your quick reply,
Aaron

Attachment: signature.asc
Description: Digital signature

Reply via email to