From: | Bruce Momjian <pgman(at)candle(dot)pha(dot)pa(dot)us> |
---|---|
To: | Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us> |
Cc: | Peter Eisentraut <peter_e(at)gmx(dot)net>, PostgreSQL-patches <pgsql-patches(at)postgresql(dot)org> |
Subject: | Re: Re: Proposal for encrypting pg_shadow passwords |
Date: | 2001-08-16 14:08:43 |
Message-ID: | 200108161408.f7GE8hi17713@candle.pha.pa.us |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-patches |
> Bruce Momjian <pgman(at)candle(dot)pha(dot)pa(dot)us> writes:
> > Just a reminder. What I think it insecure is the size of our salt.
> > With only 3300 possible salts, it doesn't take long to playback a
> > duplicate. That is true of MD5 and crypt.
>
> But aren't we increasing the size of the salt keyspace for MD5?
> It'd surely be a major oversight not to.
We aren't. I can do that, but have not discussed it yet. If we do it
is clearly a protocol change. How will old clients handle longer salt,
and how do I know if they are older if I don't bump up the protocol
version number?
--
Bruce Momjian | http://candle.pha.pa.us
pgman(at)candle(dot)pha(dot)pa(dot)us | (610) 853-3000
+ If your life is a hard drive, | 830 Blythe Avenue
+ Christ can be your backup. | Drexel Hill, Pennsylvania 19026
From | Date | Subject | |
---|---|---|---|
Next Message | Tom Lane | 2001-08-16 14:20:20 | Re: Re: Proposal for encrypting pg_shadow passwords |
Previous Message | Tom Lane | 2001-08-16 14:03:57 | Re: Re: Proposal for encrypting pg_shadow passwords |