Re: brute force attacking the password

From: Bruno Wolff III <bruno(at)wolff(dot)to>
To: Wim Bertels <wim(dot)bertels(at)khleuven(dot)be>
Cc: pgsql-admin(at)postgresql(dot)org
Subject: Re: brute force attacking the password
Date: 2005-04-19 20:37:27
Message-ID: 20050419203727.GA18200@wolff.to
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-admin

On Tue, Apr 19, 2005 at 17:00:15 +0200,
Wim Bertels <wim(dot)bertels(at)khleuven(dot)be> wrote:
> >Can't people use PAM to get this effect if they want it?
>
> what if u use pam with ldap, then u can use pg brute force cracking to
> obtain the ldap password, which is probably a bigger problem

You don't have to use it with LDAP. It does provide some password controls,
that should slow things down a little. However, you are going to have a
tough time preventing password guessing without making denial of service
attacks easy.

>
> >For most people password guessing isn't going to be a big problem as
> >the database won't be accessible from totally untrusted places and watching
> >the log files for guessing will probably be a good enough solution.
>
> what if u do want the database to be globally accessible..

Then you have a much more difficult situation. One option is to bind
user names to specific allowed IP addresses.

In response to

Responses

Browse pgsql-admin by date

  From Date Subject
Next Message Alvaro Herrera 2005-04-19 20:46:14 Re:
Previous Message Zuoxin.Wang 2005-04-19 20:27:09