Re: Encoding passwords

From: Bruce Momjian <pgman(at)candle(dot)pha(dot)pa(dot)us>
To: Lincoln Yeoh <lyeoh(at)pop(dot)jaring(dot)my>
Cc: Mike Arace <mikearace(at)hotmail(dot)com>, pgsql-general(at)postgresql(dot)org
Subject: Re: Encoding passwords
Date: 2001-09-28 15:30:19
Message-ID: 200109281530.f8SFUJa25474@candle.pha.pa.us
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-general

> >OK, I have applied the following patch to the MD5 code that puts the
> >salt at the end. We can't change the crypt() stuff because that is
> >being used in older releases.
>
> I think it needs further confirmation, because what I said was from memory
> - I still can't find the source- so take what I said with a pinch of erm
> MSG. I'd personally go with the XOR rather than concat. And I'd use a
> random salt rather than a predictable salt.
>
> But I emphasize again that I believe this is actually a small issue, and
> that leaving the salt in front won't really weaken things much looking at
> the big picture. Because nowadays computers are so fast and cheap, cracking
> the passwords usually boils down to whether the password is weak or not,
> and usually the passwords picked are weak, a week at most to crack :). You
> use salts just to _discourage_ attackers from precomputing. A skilled and
> determined attacker who knows how to exploit any hash-salt weakness will
> find it easier to crack the whole blooming computer open and get root.

It was easy to throw the salt on the end, and XOR is easy too. Can
somone else comment on this?

--
Bruce Momjian | http://candle.pha.pa.us
pgman(at)candle(dot)pha(dot)pa(dot)us | (610) 853-3000
+ If your life is a hard drive, | 830 Blythe Avenue
+ Christ can be your backup. | Drexel Hill, Pennsylvania 19026

In response to

Browse pgsql-general by date

  From Date Subject
Next Message Stephan Szabo 2001-09-28 15:35:25 Re: UNIQUE constraint and indexing
Previous Message Lincoln Yeoh 2001-09-28 15:15:28 Re: Quoting '?' placeholder in Perl's DBD::Pg?