Re: BUG #4876: author of MD5 says it's seriously broken - hash collision resistance problems

From: Joe Conway <mail(at)joeconway(dot)com>
To: "Meredith L(dot) Patterson" <mlp(at)osogato(dot)com>
Cc: Magnus Hagander <magnus(at)hagander(dot)net>, Jim Michaels <jmichae3(at)yahoo(dot)com>, pgsql-bugs(at)postgresql(dot)org
Subject: Re: BUG #4876: author of MD5 says it's seriously broken - hash collision resistance problems
Date: 2009-06-24 18:28:45
Message-ID: 4A42705D.50906@joeconway.com
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-bugs

Meredith L. Patterson wrote:
> Magnus Hagander wrote:
>>> this has implications for storing passwords as MD5 hashes. My
>>>
>> That would be the only system use of MD5. What implications are those?
>>
>> We might want to consider using a safer hash for the password storage at
>> some point, but from what I gather it's not really urgent for *that* use.
>>
> It would be a lot more urgent if we weren't salting, but IIRC we are.

If we really want something safer for system use in passwords, we ought
to be using HMAC instead. I don't believe and weaknesses of MD5 have
been found when it is used for HMAC. It has the added advantage that
there is no direct storage of the password itself, even in hashed form.

Joe

In response to

Browse pgsql-bugs by date

  From Date Subject
Next Message Scott Mead 2009-06-24 22:45:58 Re: [BUGS] Integrity check
Previous Message Theo Schlossnagle 2009-06-24 15:29:13 Re: BUG #2401: spinlocks not available on amd64