Re: Docs: Encourage strong server verification with SCRAM

From: "Jonathan S(dot) Katz" <jkatz(at)postgresql(dot)org>
To: Jacob Champion <jchampion(at)timescale(dot)com>
Cc: Stephen Frost <sfrost(at)snowman(dot)net>, Daniel Gustafsson <daniel(at)yesql(dot)se>, PostgreSQL Hackers <pgsql-hackers(at)lists(dot)postgresql(dot)org>, Michael Paquier <michael(at)paquier(dot)xyz>
Subject: Re: Docs: Encourage strong server verification with SCRAM
Date: 2023-05-28 18:21:53
Message-ID: 4ef7e9fc-126a-3be9-3165-6fdb4153381a@postgresql.org
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-hackers

On 5/26/23 6:47 PM, Jacob Champion wrote:
> On Thu, May 25, 2023 at 6:10 PM Jonathan S. Katz <jkatz(at)postgresql(dot)org> wrote:

>> + To prevent server spoofing from occurring when using
>> + <link linkend="auth-password">scram-sha-256</link> password authentication
>> + over a network, you should ensure you are connecting using SSL.
>
> seems to backtrack on the recommendation -- you have to use
> sslmode=verify-full, not just SSL, to avoid handing a weak(er) hash to
> an untrusted party.

The above assumes that the reader reviewed the previous paragraph and
followed the guidelines there. However, we can make it explicit. Please
see attached.

Thanks,

Jonathan

Attachment Content-Type Size
v4-docs-encourage-strong-server-verification-with-SCRAM.patch text/plain 1.1 KB

In response to

Responses

Browse pgsql-hackers by date

  From Date Subject
Next Message David Rowley 2023-05-28 21:42:05 Re: benchmark results comparing versions 15.2 and 16
Previous Message Peter Geoghegan 2023-05-28 16:34:23 Re: abi-compliance-checker