On Mon, Apr 8, 2019 at 2:41 PM Jonathan S. Katz <jk...@postgresql.org>
wrote:

> On 4/8/19 8:25 AM, Peter Eisentraut wrote:
> > On 2019-04-05 18:11, Jonathan S. Katz wrote:
> >> +    <para>
> >> +      We recommend using the <option>-W</option>,
> <option>--pwprompt</option>,
> >> +      or <option>--pwfile</option> flags to assign a password to the
> database
> >> +      superuser, and to override the <filename>pg_hba.conf</filename>
> default
> >> +      generation using <option>-auth-local peer</option> for local
> connections,
> >> +      and <option>-auth-host scram-sha-256</option> for remote
> connections. See
> >> +      <xref linkend="client-authentication"/> for more information on
> client
> >> +      authentication methods.
> >> +    </para>
> >
> > As discussed on hackers, we are not ready to support scram-sha-256 out
> > of the box.  So this advice, or any similar advice elsewhere, would need
> > to recommend "md5" as the setting --- which would probably be
> embarrassing.
>
> Well, it's less embarrassing than trust, and we currently state:
>

Yes. Much less.


"Also, specify -A md5 or -A password so that the default trust
> authentication mode is not used"[1]
>
> We could also modify it to say :
>
> "and <option>-auth-host scram-sha-256</option> for remote connections if
>  your client supports it, otherwise <option>-auth-host md5</option>"
>

That would be the best from a correctness, but if of course also makes
things sound more complicated. I'm not sure where the right balance is
there.

-- 
 Magnus Hagander
 Me: https://www.hagander.net/ <http://www.hagander.net/>
 Work: https://www.redpill-linpro.com/ <http://www.redpill-linpro.com/>

Reply via email to