On 2025-01-12 17:59:20 -0500, Tom Lane wrote: > "Peter J. Holzer" <hjp-pgsql@xxxxxx> writes: > > The web framework Django will automatically and transparently rehash any > > password with the currently preferred algorithm if it isn't stored that > > way already. > > Really? That implies that the framework has access to the original > cleartext password, which is a security fail already. It's a server-side web framework, and it doesn't require JavaScript in the browser. So the only way it can authenticate the user is by receiving username and password in a POST request (except for HTTP Basic or Digest authentication which are both worse, IMHO). SCRAM could be implemented in an authentication module, it just needs a SCRAM implementation in JavaScript which can be included in the login page. Somebody has probably already implemented this, but it's not in the core distribution. Anyway, Django is just the inspiration for the idea. > > Can PostgreSQL do that, too? (I haven't found anything) > > No. The server has only the hashed password, it can't reconstruct > the original. But it could get the original during login. > > If the password for the user is stored as an MD5 hash, the server > > replies to the startup message with an AuthenticationCleartextPassword > > respnse to force the client to send the password in the clear > > (obviously you only want to do that if the connection is TLS-encrypted > > or otherwise safe from eavesdropping). > > I think this idea is a nonstarter, TLS or not. We're generally moving > in the direction of never letting the server see cleartext passwords. A way to transparently upgrade from MD5 to SCRAM would IMHO be useful for that. Requesting the clear text password once is IMHO preferable to being stuck with MD5 until the users decide (or can be forced) to change their passwords (oh, and if you send an "alter user password" command the server will also see the clear text password unless the client can and does) compute the hash). PostgreSQL's MD5 hash is, as far as I can see, password equivalent. You don't actually need the original password, only the stored MD5 hash for a successful login: concat('md5', md5(concat(md5(concat(password, username)), random-salt))) md5(concat(password, username)) is stored in the pg_shadow table. That's not good. > It's already possible to configure libpq to refuse such requests > (see require_auth parameter), although that hasn't been made the > default. If it's not the default there's a decent chance that the users haven't changed it. hp -- _ | Peter J. Holzer | Story must make more sense than reality. |_|_) | | | | | hjp@xxxxxx | -- Charles Stross, "Creative writing __/ | http://www.hjp.at/ | challenge!"
Attachment:
signature.asc
Description: PGP signature