Re: Re: Proposal for encrypting pg_shadow passwords

From: Bruce Momjian <pgman(at)candle(dot)pha(dot)pa(dot)us>
To: Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us>
Cc: Peter Eisentraut <peter_e(at)gmx(dot)net>, PostgreSQL-patches <pgsql-patches(at)postgresql(dot)org>
Subject: Re: Re: Proposal for encrypting pg_shadow passwords
Date: 2001-08-16 14:08:43
Message-ID: 200108161408.f7GE8hi17713@candle.pha.pa.us
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-patches

> Bruce Momjian <pgman(at)candle(dot)pha(dot)pa(dot)us> writes:
> > Just a reminder. What I think it insecure is the size of our salt.
> > With only 3300 possible salts, it doesn't take long to playback a
> > duplicate. That is true of MD5 and crypt.
>
> But aren't we increasing the size of the salt keyspace for MD5?
> It'd surely be a major oversight not to.

We aren't. I can do that, but have not discussed it yet. If we do it
is clearly a protocol change. How will old clients handle longer salt,
and how do I know if they are older if I don't bump up the protocol
version number?

--
Bruce Momjian | http://candle.pha.pa.us
pgman(at)candle(dot)pha(dot)pa(dot)us | (610) 853-3000
+ If your life is a hard drive, | 830 Blythe Avenue
+ Christ can be your backup. | Drexel Hill, Pennsylvania 19026

In response to

Responses

Browse pgsql-patches by date

  From Date Subject
Next Message Tom Lane 2001-08-16 14:20:20 Re: Re: Proposal for encrypting pg_shadow passwords
Previous Message Tom Lane 2001-08-16 14:03:57 Re: Re: Proposal for encrypting pg_shadow passwords