Re: Support getrandom() for pg_strong_random() source

From: Peter Eisentraut <peter(at)eisentraut(dot)org>
To: Daniel Gustafsson <daniel(at)yesql(dot)se>
Cc: Masahiko Sawada <sawada(dot)mshk(at)gmail(dot)com>, Jacob Champion <jacob(dot)champion(at)enterprisedb(dot)com>, Michael Paquier <michael(at)paquier(dot)xyz>, Dagfinn Ilmari Mannsåker <ilmari(at)ilmari(dot)org>, PostgreSQL Hackers <pgsql-hackers(at)lists(dot)postgresql(dot)org>
Subject: Re: Support getrandom() for pg_strong_random() source
Date: 2025-07-30 15:10:16
Message-ID: e7f45075-4078-4d5c-923e-9cd8c3703050@eisentraut.org
Views: Whole Thread | Raw Message | Download mbox | Resend email
Thread:
Lists: pgsql-hackers

On 30.07.25 13:55, Daniel Gustafsson wrote:
>> The point still stands that the number of installations without OpenSSL support is approximately zero, so what is the purpose of this patch if approximately no one will be able to use it?

> The main usecase I've heard discussed (mostly in hallway tracks IIRC) is to
> allow multiple PRNG's so that codepaths which favor performance over
> cryptographic properties can choose, this would not be that but a small step on
> that path (whether or not that's the appropriate step is debatable).

This sounds like a reasonable goal. Intuitively, you want stronger
randomness for hashing a password than for generating UUIDs. Then
again, it's not clear how much stronger exactly. RFC 9562 does call for
"cryptographically secure" random numbers. Do we want multiple levels
of "strong" or "secure"? This needs a lot more analysis.

In response to

Browse pgsql-hackers by date

  From Date Subject
Next Message Jacob Champion 2025-07-30 15:37:38 Re: Improve prep_buildtree
Previous Message Jeff Davis 2025-07-30 15:04:17 Re: pg_dump --with-* options