Skip to content

Commit d0f4824

Browse files
committed
doc: Add note to prevent server spoofing with SCRAM
The set of recommendations added in the documentation with this commit helps in avoiding SCRAM exchanges with untrusted servers. Author: Jacob Champion, Jonathan Katz Reviewed-by: Stephen Frost, Daniel Gustafsson, Michael Paquier Discussion: https://postgr.es/m/CAAWbhmg5Gh0JetNbQi7z0yOsdsN9YECv8GoY-QBGBBiip9+JOw@mail.gmail.com
1 parent 47b7051 commit d0f4824

File tree

1 file changed

+13
-0
lines changed

1 file changed

+13
-0
lines changed

doc/src/sgml/runtime.sgml

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2014,6 +2014,19 @@ pg_dumpall -p 5432 | psql -d postgres -p 5433
20142014
CA.
20152015
</para>
20162016

2017+
<para>
2018+
To prevent server spoofing from occurring when using
2019+
<link linkend="auth-password">scram-sha-256</link> password authentication
2020+
over a network, you should ensure that you connect to the server using SSL
2021+
and with one of the anti-spoofing methods described in the previous
2022+
paragraph. Additionally, the SCRAM implementation in
2023+
<application>libpq</application> cannot protect the entire authentication
2024+
exchange, but using the <literal>channel_binding=require</literal> connection
2025+
parameter provides a mitigation against server spoofing. An attacker that
2026+
uses a rogue server to intercept a SCRAM exchange can use offline analysis to
2027+
potentially determine the hashed password from the client.
2028+
</para>
2029+
20172030
<para>
20182031
To prevent spoofing with GSSAPI, the server must be configured to accept
20192032
only <literal>hostgssenc</literal> connections

0 commit comments

Comments
 (0)