Connections - Host Based Authentication - no unencrypted passwords

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Client authentication is controlled by a configuration file, which traditionally is named pg_hba.conf and is stored in the database cluster's data directory. Each record specifies a connection type, a client IP address range (if relevant for the connection type), a database name, a user name, and the authentication method to be used for connections matching these parameters. The first record with a matching connection type, client address, requested database, and user name is used to perform authentication. There is no 'fall-through' or 'backup': if one record is chosen and the authentication fails, subsequent records are not considered. If no record matches, access is denied.

Solution

Remove any entries from the pg_hba.conf file that allows un restricted access. Examples:

host <database> <user> <cidr_notation> password [<auth_options>]
host <database> <user> <hostname|ip> <netmask> password [<auth_options>]

See Also

https://www.postgresql.org/docs/9.6/static/index.html

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-5, CSCv6|16.13, CSCv6|16.14

Plugin: Windows

Control ID: be2cf1cafae7d93ae463200fe6e232eddf61db5723efe32a93fd9e2b59c212b7