1. Home
  2. Security Hardening
  3. EDB PostgreSQL Advanced Server V11 Windows OS V2R1
  4. EP11-00-004400 – If passwords are used for authentication, the EDB Postgres Advanced Server must transmit only encrypted representations of passwords.

EP11-00-004400 – If passwords are used for authentication, the EDB Postgres Advanced Server must transmit only encrypted representations of passwords.

Details

The DoD standard for authentication is DoD-approved PKI certificates.

Authentication based on User ID and Password may be used only when it is not possible to employ a PKI certificate, and requires AO approval.

In such cases, passwords need to be protected at all times, and encryption is the standard method for protecting passwords during transmission.

DBMS passwords sent in clear text format across the network are vulnerable to discovery by unauthorized users. Disclosure of passwords may easily lead to unauthorized access to the database.

Solution

Open ‘pg_hba.conf’ in an editor.

Note that the default location for the pg_hba.conf file is in the postgresql data directory. The location of the pg_hba.conf file for a running postgres instance can be found using the following command run from a Windows command prompt:

psql -d -U -c ‘SHOW hba_file’

where, is any database in the EDB postgres instance and is a database superuser. By default, a database named ‘edb’ and a superuser named ‘enterprisedb’ are installed with EDB Postgres Advanced Server (EPAS).

For any rows that have ‘password’ specified for the ‘METHOD’ column, change the value to ‘sha-256-scram’ or ‘md5’.

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: Identification and Authentication.This control applies to the following type of system Windows.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles