mirror of
https://github.com/postgres/postgres.git
synced 2025-07-28 23:42:10 +03:00
doc: Add note to prevent server spoofing with SCRAM
The set of recommendations added in the documentation with this commit helps in avoiding SCRAM exchanges with untrusted servers. Author: Jacob Champion, Jonathan Katz Reviewed-by: Stephen Frost, Daniel Gustafsson, Michael Paquier Discussion: https://postgr.es/m/CAAWbhmg5Gh0JetNbQi7z0yOsdsN9YECv8GoY-QBGBBiip9+JOw@mail.gmail.com
This commit is contained in:
@ -2014,6 +2014,19 @@ pg_dumpall -p 5432 | psql -d postgres -p 5433
|
||||
CA.
|
||||
</para>
|
||||
|
||||
<para>
|
||||
To prevent server spoofing from occurring when using
|
||||
<link linkend="auth-password">scram-sha-256</link> password authentication
|
||||
over a network, you should ensure that you connect to the server using SSL
|
||||
and with one of the anti-spoofing methods described in the previous
|
||||
paragraph. Additionally, the SCRAM implementation in
|
||||
<application>libpq</application> cannot protect the entire authentication
|
||||
exchange, but using the <literal>channel_binding=require</literal> connection
|
||||
parameter provides a mitigation against server spoofing. An attacker that
|
||||
uses a rogue server to intercept a SCRAM exchange can use offline analysis to
|
||||
potentially determine the hashed password from the client.
|
||||
</para>
|
||||
|
||||
<para>
|
||||
To prevent spoofing with GSSAPI, the server must be configured to accept
|
||||
only <literal>hostgssenc</literal> connections
|
||||
|
Reference in New Issue
Block a user