| From: | Bruce Momjian <pgman(at)candle(dot)pha(dot)pa(dot)us> |
|---|---|
| To: | Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us> |
| Cc: | Peter Eisentraut <peter_e(at)gmx(dot)net>, PostgreSQL-patches <pgsql-patches(at)postgresql(dot)org> |
| Subject: | Re: Re: Proposal for encrypting pg_shadow passwords |
| Date: | 2001-08-16 14:08:43 |
| Message-ID: | 200108161408.f7GE8hi17713@candle.pha.pa.us |
| Views: | Whole Thread | Raw Message | Download mbox | Resend email |
| Thread: | |
| Lists: | pgsql-patches |
> Bruce Momjian <pgman(at)candle(dot)pha(dot)pa(dot)us> writes:
> > Just a reminder. What I think it insecure is the size of our salt.
> > With only 3300 possible salts, it doesn't take long to playback a
> > duplicate. That is true of MD5 and crypt.
>
> But aren't we increasing the size of the salt keyspace for MD5?
> It'd surely be a major oversight not to.
We aren't. I can do that, but have not discussed it yet. If we do it
is clearly a protocol change. How will old clients handle longer salt,
and how do I know if they are older if I don't bump up the protocol
version number?
--
Bruce Momjian | http://candle.pha.pa.us
pgman(at)candle(dot)pha(dot)pa(dot)us | (610) 853-3000
+ If your life is a hard drive, | 830 Blythe Avenue
+ Christ can be your backup. | Drexel Hill, Pennsylvania 19026
| From | Date | Subject | |
|---|---|---|---|
| Next Message | Tom Lane | 2001-08-16 14:20:20 | Re: Re: Proposal for encrypting pg_shadow passwords |
| Previous Message | Tom Lane | 2001-08-16 14:03:57 | Re: Re: Proposal for encrypting pg_shadow passwords |