From 53a5026b5cb359ec31e81fa6b20a69b053b87569 Mon Sep 17 00:00:00 2001 From: Magnus Hagander Date: Tue, 28 Oct 2008 12:10:44 +0000 Subject: Remove support for (insecure) crypt authentication. This breaks compatibility with pre-7.2 versions. --- doc/src/sgml/client-auth.sgml | 37 +++++-------------------------------- 1 file changed, 5 insertions(+), 32 deletions(-) (limited to 'doc/src/sgml/client-auth.sgml') diff --git a/doc/src/sgml/client-auth.sgml b/doc/src/sgml/client-auth.sgml index 5a308eb895..93482be6ea 100644 --- a/doc/src/sgml/client-auth.sgml +++ b/doc/src/sgml/client-auth.sgml @@ -1,4 +1,4 @@ - + Client Authentication @@ -315,24 +315,6 @@ hostnossl database user - - crypt - - - - This option is recommended only for communicating with pre-7.2 - clients. - - - - Require the client to supply a crypt()-encrypted - password for authentication. - md5 is now recommended over crypt. - See for details. - - - - password @@ -704,9 +686,6 @@ omicron bryanh guest1 MD5 - - crypt - password authentication @@ -714,21 +693,15 @@ omicron bryanh guest1 The password-based authentication methods are md5, - crypt, and password. These methods operate + and password. These methods operate similarly except for the way that the password is sent across the - connection: respectively, MD5-hashed, crypt-encrypted, and clear-text. - A limitation is that the crypt method does not work with - passwords that have been encrypted in pg_authid. + connection: respectively, MD5-hashed and clear-text. If you are at all concerned about password - sniffing attacks then md5 is preferred, with - crypt to be used only if you must support pre-7.2 - clients. Plain password should be avoided especially for - connections over the open Internet (unless you use SSL, - SSH, or another - communications security wrapper around the connection). + sniffing attacks then md5 is preferred. + Plain password should always be avoided if possible. -- cgit v1.2.1