-<!-- $Header: /cvsroot/pgsql/doc/src/sgml/client-auth.sgml,v 1.1 2000/06/18 21:24:51 petere Exp $ -->
+<!-- $Header: /cvsroot/pgsql/doc/src/sgml/client-auth.sgml,v 1.2 2000/07/04 16:31:51 petere Exp $ -->
<chapter id="client-authentication">
<title>Client Authentication</title>
<term>password</term>
<listitem>
<para>
- The client is required to supply a password for the connection
+ The client is required to supply a password with the connection
attempt which is required to match the password that was set up
- for the user. (These passwords are separate from any operating
- sytem password.)
+ for the user.
</para>
<para>
- An optional password file may be specified after the
- <literal>password</literal> keyword to obtain the password from
- that file rather than the pg_shadow system catalog.
+ An optional file name may be specified after the
+ <literal>password</literal> keyword. This file is expected to
+ contain a list of users that this record pertains to, and
+ optionally alternative passwords.
</para>
<para>
The password is sent over the wire in clear text. For better
<para>
Like the <literal>password</literal> method, but the password
is sent over the wire encrypted using a simple
- challenge-response protocol. Note that this is still not
+ challenge-response protocol. This is still not
cryptographically secure but it protects against incidental
- wire-sniffing. Interestingly enough, the
- <literal>crypt</literal> does not support secondary password
- files.
+ wire-sniffing. The name of a file may follow the
+ <literal>crypt</literal> keyword that contains a list of users
+ that this record pertains to.
</para>
</listitem>
</varlistentry>
<sect2>
<title>Password authentication</title>
<para>
- Ordinarily, the password for each database user is stored in the
- pg_shadow system catalog table. Passwords can be managed with the
- query language commands <command>CREATE USER</command> and
- <command>ALTER USER</command>, e.g., <userinput>CREATE USER foo
- WITH PASSWORD 'secret';</userinput>. By default, that is, if no
- password has explicitly been set up, the stored password is
- <quote>NULL</quote> and password authentication will always fail
- for that user.
+ <productname>Postgres</> database passwords are separate from any
+ operating system user passwords. Ordinarily, the password for each
+ database user is stored in the pg_shadow system catalog table.
+ Passwords can be managed with the query language commands
+ <command>CREATE USER</command> and <command>ALTER USER</command>,
+ e.g., <userinput>CREATE USER foo WITH PASSWORD
+ 'secret';</userinput>. By default, that is, if no password has
+ explicitly been set up, the stored password is <quote>NULL</quote>
+ and password authentication will always fail for that user.
</para>
<para>
- Secondary password files can be used if a given set of passwords
- should only apply to a particular database or set thereof.
- Secondary password files have a format similar to the standard
- Unix password file <filename>/etc/passwd</filename>, that is,
- <synopsis>
+ To restrict the set of users that are allowed to connect to
+ certain databases, list the set of users in a separate file (one
+ user name per line) in the same directory that
+ <filename>pg_hba.conf</> is in, and mention the (base) name of the
+ file after the <literal>password</> or <literal>crypt</> keyword,
+ respectively, in <filename>pg_hba.conf</>. If you do not use this
+ feature, then any user that is known to the database system can
+ connect (as long as he passes password authentication, of course).
+ </para>
+
+ <para>
+ These files can also be used a apply a different set of passwords
+ to a particular database or set thereof. In that case, the files
+ have a format similar to the standard Unix password file
+ <filename>/etc/passwd</filename>, that is,
+<synopsis>
<replaceable>username</replaceable>:<replaceable>password</replaceable>
- </synopsis>
+</synopsis>
Any extra colon separated fields following the password are
ignored. The password is expected to be encrypted using the
system's <function>crypt()</function> function. The utility
</para>
<para>
- Secondary password files can also be used to restrict certain
- users from connecting to certain databases at all. This is
- currently not possible to achieve using the normal password
- mechanism (because users and passwords are global across all
- databases). If a user is not listed in the applicable password
- file the connection will be refused.
+ Lines with and without passwords can be mixed in secondary
+ password files. Lines without password indicate use the main
+ password in <literal>pg_shadow</> that is managed by
+ <command>CREATE USER</> and <command>ALTER USER</>. Lines with
+ passwords will cause that password to be used. A password entry of
+ <quote>+</quote> also means using the pg_shadow password.
</para>
<para>
- Note that using secondary password files means that one can no
- longer use <command>ALTER USER</command> to change one's password.
- It will still appear to work but the password one is actually
- changing is not the password that the system will end up using.
+ Alternative passwords cannot be used when using the
+ <literal>crypt</> method. The file will still be evaluated as
+ usual but the password field will simply be ignored and the
+ <literal>pg_shadow</> password will be used.
</para>
+
+ <para>
+ Note that using alternative passwords like this means that one can
+ no longer use <command>ALTER USER</command> to change one's
+ password. It will still appear to work but the password one is
+ actually changing is not the password that the system will end up
+ using.
+ </para>
+
</sect2>
<sect2>
The <quote>Identification Protocol</quote> is described in
<citetitle>RFC 1413</citetitle>. Virtually every Unix-like
operating systems ships with an ident server that listens on TCP
- port 113 by default. The basic functionality of the ident server
+ port 113 by default. The basic functionality of an ident server
is to answer questions like <quote>What user initiated the
connection that goes out of your port <replaceable>X</replaceable>
and connects to my port <replaceable>Y</replaceable>?</quote>.
- Since both <replaceable>X</replaceable> and
- <replaceable>Y</replaceable> are known,
- <productname>Postgres</productname> could theoretically determine
- the operating system user for any given connection this way.
+ Since <productname>Postgres</> knows both <replaceable>X</> and
+ <replaceable>Y</> when a physical connection is established, it
+ can interrogate the ident server on the host of the connecting
+ client and could theoretically determine the operating system user
+ for any given connection this way.
</para>
<para>
*
*
* IDENTIFICATION
- * $Header: /cvsroot/pgsql/src/backend/libpq/auth.c,v 1.47 2000/05/27 04:13:05 momjian Exp $
+ * $Header: /cvsroot/pgsql/src/backend/libpq/auth.c,v 1.48 2000/07/04 16:31:53 petere Exp $
*
*-------------------------------------------------------------------------
*/
#ifdef KRB4
-/* This has to be ifdef'd out because krb.h does exist. This needs
- to be fixed.
-*/
/*----------------------------------------------------------------
* MIT Kerberos authentication system - protocol version 4
*----------------------------------------------------------------
#ifdef KRB5
-/* This needs to be ifdef'd out because krb5.h doesn't exist. This needs
- to be fixed.
-*/
/*----------------------------------------------------------------
* MIT Kerberos authentication system - protocol version 5
*----------------------------------------------------------------
/*
- * Use the local flat password file if clear passwords are used and the file is
- * specified. Otherwise use the password in the pg_shadow table, encrypted or
- * not.
+ * Handle `password' and `crypt' records. If an auth argument was
+ * specified, use the respective file. Else use pg_shadow passwords.
*/
-
static int
checkPassword(Port *port, char *user, char *password)
{
- if (port->auth_method == uaPassword && port->auth_arg[0] != '\0')
- return verify_password(port->auth_arg, user, password);
+ if (port->auth_arg[0] != '\0')
+ return verify_password(port, user, password);
return crypt_verify(port, user, password);
}
* Portions Copyright (c) 1996-2000, PostgreSQL, Inc
* Portions Copyright (c) 1994, Regents of the University of California
*
- * $Id: password.c,v 1.29 2000/06/02 15:57:21 momjian Exp $
+ * $Id: password.c,v 1.30 2000/07/04 16:31:53 petere Exp $
*
*/
#include "libpq/libpq.h"
#include "libpq/password.h"
+#include "libpq/crypt.h"
#include "miscadmin.h"
int
-verify_password(char *auth_arg, char *user, char *password)
+verify_password(const Port *port, const char *user, const char *password)
{
char *pw_file_fullname;
FILE *pw_file;
- pw_file_fullname = (char *) palloc(strlen(DataDir) + strlen(auth_arg) + 2);
+ pw_file_fullname = (char *) palloc(strlen(DataDir) + strlen(port->auth_arg) + 2);
strcpy(pw_file_fullname, DataDir);
strcat(pw_file_fullname, "/");
- strcat(pw_file_fullname, auth_arg);
+ strcat(pw_file_fullname, port->auth_arg);
pw_file = AllocateFile(pw_file_fullname, PG_BINARY_R);
if (!pw_file)
*test_pw;
fgets(pw_file_line, sizeof(pw_file_line), pw_file);
+ /* kill the newline */
+ if (pw_file_line[strlen(pw_file_line) - 1] == '\n')
+ pw_file_line[strlen(pw_file_line) - 1] = '\0';
+
p = pw_file_line;
test_user = strtok(p, ":");
test_pw = strtok(NULL, ":");
- if (!test_user || !test_pw ||
- test_user[0] == '\0' || test_pw[0] == '\0')
+ if (!test_user || test_user[0] == '\0')
continue;
- /* kill the newline */
- if (test_pw[strlen(test_pw) - 1] == '\n')
- test_pw[strlen(test_pw) - 1] = '\0';
-
if (strcmp(user, test_user) == 0)
{
/* we're outta here one way or the other, so close file */
FreeFile(pw_file);
+ /*
+ * If the password is empty of "+" then we use the regular
+ * pg_shadow passwords. If we use crypt then we have to
+ * use pg_shadow passwords no matter what.
+ */
+ if (port->auth_method == uaCrypt
+ || test_pw == NULL || test_pw[0] == '\0'
+ || strcmp(test_pw, "+")==0)
+ return crypt_verify(port, user, password);
+
if (strcmp(crypt(password, test_pw), test_pw) == 0)
{
/* it matched. */
/* get user name */
p = line;
- if ((q = strchr(p, ':')) == NULL)
- {
- fprintf(stderr, "%s: line %d: illegal format.\n",
- filename, npwds + 1);
- exit(1);
- }
- *(q++) = '\0';
+ if ((q = strchr(p, ':')) != NULL)
+ *q = '\0';
+
if (strlen(p) == 0)
{
fprintf(stderr, "%s: line %d: null user name.\n",
}
/* get password field */
- p = q;
- q = strchr(p, ':');
-
- /*
- * --- don't care ----- if ((q = strchr(p, ':')) == NULL) {
- * fprintf(stderr, "%s: line %d: illegal format.\n", filename,
- * npwds + 1); exit(1); }
- */
-
- if (q != NULL)
- *(q++) = '\0';
- if (strlen(p) != 13)
+ if (q)
{
- fprintf(stderr, "WARNING: %s: line %d: illegal password length.\n",
- filename, npwds + 1);
+ p = q + 1;
+ q = strchr(p, ':');
+
+ if (q != NULL)
+ *(q++) = '\0';
+
+ if (strlen(p) != 13 && strcmp(p, "+")!=0)
+ {
+ fprintf(stderr, "WARNING: %s: line %d: invalid password length.\n",
+ filename, npwds + 1);
+ }
+ pwds[npwds].pwd = strdup(p);
}
- pwds[npwds].pwd = strdup(p);
+ else
+ pwds[npwds].pwd = NULL;
/* rest of the line is treated as is */
if (q == NULL)
/* write file */
for (i = 0; i < npwds; ++i)
{
- fprintf(fp, "%s:%s%s%s\n", pwds[i].uname, pwds[i].pwd,
- pwds[i].rest ? ":" : "",
- pwds[i].rest ? pwds[i].rest : "");
+ fprintf(fp, "%s", pwds[i].uname);
+ if (pwds[i].pwd)
+ fprintf(fp, ":%s", pwds[i].pwd);
+ if (pwds[i].rest)
+ fprintf(fp, ":%s", pwds[i].rest);
+ fprintf(fp, "\n");
}
fclose(fp);