Re: BUG #15911: Why no Bcrypt in pg_hba.conf?

From: raf <raf(at)raf(dot)org>
To: pgsql-bugs(at)lists(dot)postgresql(dot)org
Subject: Re: BUG #15911: Why no Bcrypt in pg_hba.conf?
Date: 2019-07-16 23:22:42
Message-ID: 20190716232242.bvdu6w7jnk3fj237@raf.org
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-bugs

Tom Lane wrote:

> Andrew Gierth <andrew(at)tao11(dot)riddles(dot)org(dot)uk> writes:
> > "PG" == PG Bug reporting form <noreply(at)postgresql(dot)org> writes:
> > PG> Can you please add `bcrypt` as method option?
>
> > Not unless it gets added to the SCRAM specification.
>
> > Note that our primary goal here is to provide a secure and standard
> > challenge-response authentication mechanism, not to provide random
> > alternate algorithms for password storage.
>
> Worth noting here is that for us, the price of an additional
> authentication mechanism is very high, because it's not just a matter
> of adding some code to the server. Client-side libraries also need to
> be taught about it, and most of those are not maintained by the core
> PG project. So it takes years to make anything happen --- the
> addition of SCRAM is still a work in progress, for example.
>
> Thus, we aren't going to add stuff on a whim, and when we do add some
> new mechanism, there has to be a really solid argument that it's a
> *significant* advance over what we have.
>
> regards, tom lane

bcrypt is better than pbkdf2 but pbkdf2 is still good
for the same reasons that bcrypt is good (brute force
resistance). if you want bcrypt/scrypt/argon2, pbkdf2
will probably be good enough. and some organisations
may require pbkdf2 because it is NIST-approved while
the others aren't.

cheers,
raf

In response to

Responses

Browse pgsql-bugs by date

  From Date Subject
Next Message Manuel Rigger 2019-07-16 23:29:18 BETWEEN SYMMETRIC condition results in "row is too big: ..., maximum size 8160"
Previous Message Marco Sulla 2019-07-16 20:44:32 Re: BUG #15911: Why no Bcrypt in pg_hba.conf?