Re: A stab at implementing better password hashing, with mixed results

From: Alastair Turner <bell(at)ctrlf5(dot)co(dot)za>
To: PostgreSQL hackers <pgsql-hackers(at)postgresql(dot)org>
Subject: Re: A stab at implementing better password hashing, with mixed results
Date: 2012-12-28 18:25:53
Message-ID: CAFgq2fUdwMrHFWHkRBHGQk+G00z86fTO8rP+5M16tuEUdP1Ykw@mail.gmail.com
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-hackers

On Thu, Dec 27, 2012 at 5:39 PM, Peter Bex <Peter(dot)Bex(at)xs4all(dot)nl> wrote:
> On Thu, Dec 27, 2012 at 12:31:08PM -0300, Claudio Freire wrote:
>> On Thu, Dec 27, 2012 at 11:46 AM, Peter Bex <Peter(dot)Bex(at)xs4all(dot)nl> wrote:
>> >
>> > Implementing a more secure challenge-response based algorithm means
>> > a change in the client-server protocol. Perhaps something like SCRAM
>> > (maybe through SASL) really is the way forward for this, but that
>> > seems like quite a project and it seems to dictate how the passwords are
>> > stored; it requires a hash of the PBKDF2 algorithm to be stored.
>>
>> It would be nonsense to do it in any other way... protecting the
>> password store and not the exchange would just shift the weak spot.
>
> Yeah, that's why I was being rather pessimistic about the patch I posted.
> However, SCRAM will only protect the password; SSL is still required
> to protect against connection hijacking.
>
The thread that ended with
http://archives.postgresql.org/message-id/5086CB7A.5040406@gmx.net
also tended towards SASL and SCRAM as the best direction for
developing password and GSSAPI/Kerberos authentication.

In response to

Browse pgsql-hackers by date

  From Date Subject
Next Message Hannu Krosing 2012-12-28 18:29:48 Re: multiple CREATE FUNCTION AS items for PLs
Previous Message Peter Geoghegan 2012-12-28 18:21:50 Re: enhanced error fields