Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Should we drop md5 auth in PostgreSQL ? We are in 2023 !!! #8061

Open
joanhey opened this issue Mar 23, 2023 · 4 comments
Open

Should we drop md5 auth in PostgreSQL ? We are in 2023 !!! #8061

joanhey opened this issue Mar 23, 2023 · 4 comments

Comments

@joanhey
Copy link
Contributor

joanhey commented Mar 23, 2023

With the new PostgreSQL official docker image, we have again the problem with md5 auth.
I can fix it, but is it realistic to use md5 auth in 2023 ?

Some frameworks that fail, they had the time and energy to patch libpq for performance. So they can use some time to add the new scram (sha-256) auth in their frameworks.

More info: #7557 #8002

Give your feedback.

@NateBrady23
Copy link
Member

@joanhey How many frameworks are failing because of this? Do you know offhand and can ping the contributors here?

@fakeshadow
Copy link
Contributor

fakeshadow commented Mar 23, 2023

It should be default to sasl auth at this point. But there are some points I consider worth to mention:

  1. It is still realistic to use md5. Do note that sasl auth can still happen on plain TCP connection which make it not any more safer realistically speaking. I believe most people use plain TCP in trusted local network anyway. (or unix socket)
  2. Some if not most frameworks fail to do sasl auth are not using libpq. They are likely to use their language native db client which cause the problem(lack of feature) and it's considerable more work to write a native db driver than fork and patch libpq.

@fakeshadow
Copy link
Contributor

@fafhrd91 Maybe it worth to implement sasl auth in ntex postgres.

@joanhey
Copy link
Contributor Author

joanhey commented Mar 29, 2023

I think that fail for the auth ~30 frameworks permutations.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants