From: | Bruce Momjian <pgman(at)candle(dot)pha(dot)pa(dot)us> |
---|---|
To: | Lincoln Yeoh <lyeoh(at)pop(dot)jaring(dot)my> |
Cc: | Mike Arace <mikearace(at)hotmail(dot)com>, pgsql-general(at)postgresql(dot)org |
Subject: | Re: Encoding passwords |
Date: | 2001-09-28 15:30:19 |
Message-ID: | 200109281530.f8SFUJa25474@candle.pha.pa.us |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-general |
> >OK, I have applied the following patch to the MD5 code that puts the
> >salt at the end. We can't change the crypt() stuff because that is
> >being used in older releases.
>
> I think it needs further confirmation, because what I said was from memory
> - I still can't find the source- so take what I said with a pinch of erm
> MSG. I'd personally go with the XOR rather than concat. And I'd use a
> random salt rather than a predictable salt.
>
> But I emphasize again that I believe this is actually a small issue, and
> that leaving the salt in front won't really weaken things much looking at
> the big picture. Because nowadays computers are so fast and cheap, cracking
> the passwords usually boils down to whether the password is weak or not,
> and usually the passwords picked are weak, a week at most to crack :). You
> use salts just to _discourage_ attackers from precomputing. A skilled and
> determined attacker who knows how to exploit any hash-salt weakness will
> find it easier to crack the whole blooming computer open and get root.
It was easy to throw the salt on the end, and XOR is easy too. Can
somone else comment on this?
--
Bruce Momjian | http://candle.pha.pa.us
pgman(at)candle(dot)pha(dot)pa(dot)us | (610) 853-3000
+ If your life is a hard drive, | 830 Blythe Avenue
+ Christ can be your backup. | Drexel Hill, Pennsylvania 19026
From | Date | Subject | |
---|---|---|---|
Next Message | Stephan Szabo | 2001-09-28 15:35:25 | Re: UNIQUE constraint and indexing |
Previous Message | Lincoln Yeoh | 2001-09-28 15:15:28 | Re: Quoting '?' placeholder in Perl's DBD::Pg? |