From: | "Liu, Jianli (Jianli)" <jlliu(at)avaya(dot)com> |
---|---|
To: | "pgsql-admin(at)postgresql(dot)org" <pgsql-admin(at)postgresql(dot)org> |
Subject: | Re: User password encryption using a stronger hashing function? |
Date: | 2011-12-20 17:32:52 |
Message-ID: | 47AB18AC0F23934383F2BBA7EE3D8D742281EB9415@DC-US1MBEX4.global.avaya.com |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-admin |
No one has responded to my questions. I am wondering if anyone can point me to where in postgresql source code I can further look into the issue and explore the possibility of this change? Thanks.
Sent: Thursday, December 15, 2011 4:53 PM
To: pgsql-admin(at)postgresql(dot)org
Subject: [ADMIN] User password encryption using a stronger hashing function?
By default, postgresql encrypts user passwords using the MD5 hashing function. They can be seen as "md5....." in the rolpassword column of the pg_authid table. Is there a mechanism that allows us to change this default behavior such that postgresql can encrypt the passwords stored in the pg_authid table using a stronger hashing function such as SHA1?
Postgresql conf file has a property "ssl_ciphers" in which you can specify a list of ciphers. But they are only used on ssl connections and have no impact on the ciphers used in user password encryption. Is this correct?
From | Date | Subject | |
---|---|---|---|
Next Message | Rural Hunter | 2011-12-21 07:55:18 | lock problem |
Previous Message | Jens Wilke | 2011-12-20 17:06:06 | Re: PG export/import encoding issue |