Re: [HACKERS] Hashing passwords (was Updated TODO list)

From: "Gene Sokolov" <hook(at)aktrad(dot)ru>
To: "Louis Bertrand" <louis(at)bertrandtech(dot)on(dot)ca>
Cc: <pgsql-hackers(at)postgreSQL(dot)org>
Subject: Re: [HACKERS] Hashing passwords (was Updated TODO list)
Date: 1999-07-09 14:21:57
Message-ID: 065901beca16$66c6abe0$0d8cdac3@aktrad.ru
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-hackers

> It would be nice if the password scheme you finally settle on can be
> optionally replaced (compile-time) by the password hash available native
> on the OS. In the case of OpenBSD, the Blowfish-based replacement for the
> DES or MD5 based crypt(3) is better suited to resisting dictionary and
> other offline attacks by fast processors.

Once you say "strong encryption", you also say "export controls", "wasenaar"
and "avoid it if you can". It means PgSQL team would have to maintain two
distributions - one for the US and one for the rest of the world. It's not
like it cannot be done. I just see no benefit in using encryption instead of
hashing. There is no need for DES or Blowfish to justify the pain.

Gene Sokolov.

In response to

Responses

Browse pgsql-hackers by date

  From Date Subject
Next Message Mark Hollomon 1999-07-09 14:46:51 Re: [HACKERS] Hashing passwords (was Updated TODO list)
Previous Message Gene Sokolov 1999-07-09 14:08:12 Re: [HACKERS] Hashing passwords (was Updated TODO list)