| From: | Joe Conway <mail(at)joeconway(dot)com> |
|---|---|
| To: | "Meredith L(dot) Patterson" <mlp(at)osogato(dot)com> |
| Cc: | Magnus Hagander <magnus(at)hagander(dot)net>, Jim Michaels <jmichae3(at)yahoo(dot)com>, pgsql-bugs(at)postgresql(dot)org |
| Subject: | Re: BUG #4876: author of MD5 says it's seriously broken - hash collision resistance problems |
| Date: | 2009-06-24 18:28:45 |
| Message-ID: | 4A42705D.50906@joeconway.com |
| Views: | Whole Thread | Raw Message | Download mbox | Resend email |
| Thread: | |
| Lists: | pgsql-bugs |
Meredith L. Patterson wrote:
> Magnus Hagander wrote:
>>> this has implications for storing passwords as MD5 hashes. My
>>>
>> That would be the only system use of MD5. What implications are those?
>>
>> We might want to consider using a safer hash for the password storage at
>> some point, but from what I gather it's not really urgent for *that* use.
>>
> It would be a lot more urgent if we weren't salting, but IIRC we are.
If we really want something safer for system use in passwords, we ought
to be using HMAC instead. I don't believe and weaknesses of MD5 have
been found when it is used for HMAC. It has the added advantage that
there is no direct storage of the password itself, even in hashed form.
Joe
| From | Date | Subject | |
|---|---|---|---|
| Next Message | Scott Mead | 2009-06-24 22:45:58 | Re: [BUGS] Integrity check |
| Previous Message | Theo Schlossnagle | 2009-06-24 15:29:13 | Re: BUG #2401: spinlocks not available on amd64 |