Change the default from md5 to scram-sha-256 in pg_hba.conf#582
Change the default from md5 to scram-sha-256 in pg_hba.conf#582bdunne wants to merge 1 commit intosclorg:masterfrom
Conversation
|
Looks like this has been supported since postgres 10 and is the standard as of postgres 14 Someone just needs to set the password after changing that setting and all systems go. (even if To see if you need to upgrade: /via https://www.crunchydata.com/blog/how-to-upgrade-postgresql-passwords-to-scram |
|
We are not able to follow the steps to convert all passwords as the article above describes, because that's what only the users of the postgresql image can do. What we can do is making the default algorithm configurable and changing the default -- that should not affect new deployments because the pg_hba.conf file is created only when creating the database, but we can still surprise users that might use older clients. Anyway, the change is inevitable at some point, so we should start somewhere (changing the default only in RHEL10/c10s might be the least painful way). @fila43 WDYT? |
|
@hhorak I think we are close to the same page. This migration is definitely on our radar since many companies are requiring the migration to It is really too bad that there is not a way to upgrade the passwords automatically without risking writing the plain text passwords to disk. So what I heard you say:
Questions:
Cheers to Brno. When we worked for RH, we enjoyed our great team members over there. |
Pull Request validationFailed🔴 Review - Missing review from a member (1 required) Success🟢 CI - All checks have passed |
No description provided.