Re: User password encryption using a stronger hashing function?

Поиск
Список
Период
Сортировка
От Bruce Momjian
Тема Re: User password encryption using a stronger hashing function?
Дата
Msg-id 20120211005913.GB25379@momjian.us
обсуждение исходный текст
Ответ на Re: User password encryption using a stronger hashing function?  ("ktm@rice.edu" <ktm@rice.edu>)
Список pgsql-admin
On Wed, Dec 28, 2011 at 08:25:54AM -0600, ktm@rice.edu wrote:
> > >If you have a need for stronger hashing functions you might want
> > >to contact one of the consultants who does contract work on
> > >PostgreSQL development and find out what'd be involved in funding
> > >the development of the feature. Think about why you need it first,
> > >though; what threat(s) are you trying to protect from?
> >
> > The reasoning is that if your Database content get lost your
> > passwords are in danger to be decrypted todays with md5 hash and
> > most of the time passwords are reused at other places. With stronger
> > hashes at least the password itself would be somewhat safe. But as
> > said in many environment the application does not use database users
> > anyway, but does its own user management with hopefully stronger
> > encryption of the passwords.
> >
> > Thanks
> >
> > Andreas
> >
> Exactly. You need to use GSSAPI or something else to secure it. Then
> the passwords are not available to be decrypted in the database and
> you can use much more extensive encryption for them.

The limitations of MD5 do not apply to the way we use MD5 to store
passwords in Postgres;  see:

    http://archives.postgresql.org/pgsql-hackers/2008-01/msg00846.php


--
  Bruce Momjian  <bruce@momjian.us>        http://momjian.us
  EnterpriseDB                             http://enterprisedb.com

  + It's impossible for everything to be true. +

В списке pgsql-admin по дате отправления:

Предыдущее
От: "Kevin Grittner"
Дата:
Сообщение: Re: 32-bit to 64-bit migration options
Следующее
От: Wissem
Дата:
Сообщение: Automatic Failover Hot Standby / Streaming replication