Bug#779683: [Pkg-postgresql-public] Bug#779683: postgresql: pg_hba scripts (mis)configures for MD5 authentication

2015-03-05 Thread Michael Samuel
On 5 March 2015 at 22:39, Aaron Zauner wrote: > Yep. I confused SRP with PSK ciphersuites here. There're no ciphersuites > that support PKIX and SRP. Unfortunately there's also only AES-CBC > (mac-then-encrypt) as a possible option when using SRP. > https://www.iana.org/assignments/tls-parameters

Bug#779683: [Pkg-postgresql-public] Bug#779683: postgresql: pg_hba scripts (mis)configures for MD5 authentication

2015-03-05 Thread Michael Samuel
Hi, On 5 March 2015 at 19:58, Christoph Berg wrote: >> That's an excellent thought.. I wasn't aware of this. Unfortunately, >> I'm not sure that we could make it the default in Debian as it requires >> server-side certificates be configured and used properly (correct?) but >> I don't see a reas

Bug#779683: [Pkg-postgresql-public] Bug#779683: postgresql: pg_hba scripts (mis)configures for MD5 authentication

2015-03-04 Thread Michael Samuel
Hi, On 5 March 2015 at 01:25, Stephen Frost wrote: > I was hoping for an option which would actually improve it, not make it > the same as another mechanism that already exists.. Ok, so my general advice would definitely still be to use "password" authentication for unix and TLS sockets. When p

Bug#779683: [Pkg-postgresql-public] Bug#779683: postgresql: pg_hba scripts (mis)configures for MD5 authentication

2015-03-03 Thread Michael Samuel
Hi, On 4 March 2015 at 15:22, Stephen Frost wrote: > That really just changes it back to the 'password' case though, doesn't > it? An attacker who can sniff the network would get the response from > the client and be able to use it in a replay attack just as if it was > the password. They can a

Bug#779683: [Pkg-postgresql-public] Bug#779683: postgresql: pg_hba scripts (mis)configures for MD5 authentication

2015-03-03 Thread Michael Samuel
Hi, On 4 March 2015 at 12:33, Stephen Frost wrote: > * Michael Samuel (m...@miknet.net) wrote: >> - I don't recommend storing the password in cleartext >> - I *do* recommend exchanging the password in cleartext over the network > > And I will continue to argue that it

Bug#779683: [Pkg-postgresql-public] Bug#779683: postgresql: pg_hba scripts (mis)configures for MD5 authentication

2015-03-03 Thread Michael Samuel
ponse protocol to be added to the heap. If anyone from postgres is interested in putting a network-compatible fix for password hashing in, feel free to contact me. On 4 March 2015 at 12:09, Michael Samuel wrote: > Hi, > > On 4 March 2015 at 12:03, Aaron Zauner wrote: >>> Uh,

Bug#779683: [Pkg-postgresql-public] Bug#779683: postgresql: pg_hba scripts (mis)configures for MD5 authentication

2015-03-03 Thread Michael Samuel
Hi, On 4 March 2015 at 12:03, Aaron Zauner wrote: >> Uh, no, using 'password' is far worse, and uniformly so, than using md5. >> I have no idea why anyone would think it's better to store a cleartext >> version of your password in the pg_authid data (note that pg_shadow is >> only a view now, I r

Bug#767227: [oss-security] Re: CVE request: lsyncd command injection

2014-11-21 Thread Michael Samuel
On 20 November 2014 17:55, wrote: > Use CVE-2014-8990. The scope of this CVE ID includes both: > 2. denial of service scenarios in which a user with write access > to a local directory uses special characters to make > synchronization fail (might have security relevance in some >