Re: sunsetting md5 password support - Mailing list pgsql-hackers

From Jelte Fennema-Nio
Subject Re: sunsetting md5 password support
Date
Msg-id CAGECzQSSYV1H8DAPbKy_wF+4yRNW3=5rskTJabbsTHcqdXsPdg@mail.gmail.com
Whole thread Raw
In response to Re: sunsetting md5 password support  (Heikki Linnakangas <hlinnaka@iki.fi>)
List pgsql-hackers
On Thu, 10 Oct 2024 at 23:45, Heikki Linnakangas <hlinnaka@iki.fi> wrote:
> I wouldn't recommend it if SCRAM is available, but yeah, with TLS and
> sslmode=verify-full, it's secure enough.

Agreed, I'd definitely still recommend SCRAM over password. A big
downside of "password" auth over TLS is that plaintext passwords get
to the server, so a coredump would contain these passwords.

Also, I wanted to call out that SCRAM still needs sslmode=verify-full
to be fully secure. With the SCRAM hash of the server, together with a
MITM between client and server, an attacker can impersonate the client
without the client or server realizing. PgBouncer actually does this:
https://www.pgbouncer.org/config.html#limitations



pgsql-hackers by date:

Previous
From: Heikki Linnakangas
Date:
Subject: Re: sunsetting md5 password support
Next
From: Jesper Pedersen
Date:
Subject: Re: sunsetting md5 password support