Re: Is md5 really more secure than crypt?

From: Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us>
To: "Glen Parker" <glenebob(at)nwlink(dot)com>
Cc: "Pg-General" <pgsql-general(at)postgresql(dot)org>
Subject: Re: Is md5 really more secure than crypt?
Date: 2002-06-15 03:56:35
Message-ID: 11136.1024113395@sss.pgh.pa.us
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-general

"Glen Parker" <glenebob(at)nwlink(dot)com> writes:
> This means that the only way a password can be compromized is to see the
> password hash in pg_shadow, and the only thing it can be used for is
> logging into postgres throught playback. No plain-text password can be
> obtained.

Good point. If you can read the pg_shadow password entries, then you
are already superuser w.r.t. Postgres, so what need have you to break
into any other database user identities?

I think the concern that was originally advanced about all this was
that the database admin should not be able to read the clear-text
passwords of his users, because far too many people use the same
password for different purposes, and so a DBA might learn how to
get into accounts he shouldn't have access to. The MD5 scheme does
fix that problem (unless the other account chances to use the very
same MD5 hash scheme we do, which seems unlikely).

Still, we had a *long* discussion about the design of the MD5 password
scheme about a year ago, and I thought we'd come up with a design that
was proof against this sort of attack. Need to go back and consult
the list archives...

regards, tom lane

In response to

Responses

Browse pgsql-general by date

  From Date Subject
Next Message Bruce Momjian 2002-06-15 05:10:56 Re: Is md5 really more secure than crypt?
Previous Message Tom Lane 2002-06-15 03:37:48 Re: read this and puke