Index: contrib/pgcrypto/README.pgcrypto =================================================================== RCS file: /opt/arc/cvs2/pgsql/contrib/pgcrypto/README.pgcrypto,v retrieving revision 1.13 diff -u -c -r1.13 README.pgcrypto *** contrib/pgcrypto/README.pgcrypto 13 Aug 2005 02:06:20 -0000 1.13 --- contrib/pgcrypto/README.pgcrypto 1 Nov 2005 22:56:42 -0000 *************** *** 3,8 **** --- 3,10 ---- ================================================= Marko Kreen + // Note: this document is in asciidoc format. + 1. Installation ----------------- *************** *** 17,22 **** --- 19,31 ---- for the module. They make sure the functions here produce correct results. + Next, to get the function into particular database, run commands in + file pgcrypto.sql, which should be installed into shared files directory. + + Example using psql: + + psql -d DBNAME -f pgcrypto.sql + 2. Notes ---------- *************** *** 248,254 **** crypt-des 362837 7 days 19 years sha1 590223 4 days 12 years md5 2345086 1 day 3 years - password 143781000 25 mins 18 days ------------------------------------------------------------ * The machine used is 1.5GHz Pentium 4. --- 257,262 ---- *************** *** 256,263 **** John the Ripper v1.6.38 `-test` output. * MD5 numbers are from mdcrack 1.2. * SHA1 numbers are from lcrack-20031130-beta. - * MySQL password() numbers are from my own tests. - (http://grue.l-t.ee/~marko/src/mypass/) * `crypt-bf` numbers are taken using simple program that loops over 1000 8-character passwords. That way I can show the speed with different number of rounds. For reference: `john -test` shows 213 --- 264,269 ---- *************** *** 268,276 **** Note that the "try all combinations" is not a realistic exercise. Usually password cracking is done with the help of dictionaries, which contain both regular words and various mutations of them. So, even ! somewhat word-like passwords will be cracked much faster than the above numbers suggest, and a 6-character non-word like password may escape ! cracking. Or may not. 5. PGP encryption --- 274,282 ---- Note that the "try all combinations" is not a realistic exercise. Usually password cracking is done with the help of dictionaries, which contain both regular words and various mutations of them. So, even ! somewhat word-like passwords could be cracked much faster than the above numbers suggest, and a 6-character non-word like password may escape ! cracking. Or not. 5. PGP encryption