Re: Salt in encrypted password in pg_shadow

Поиск
Список
Период
Сортировка
От David Garamond
Тема Re: Salt in encrypted password in pg_shadow
Дата
Msg-id 413E6A55.7060704@zara.6.isreserved.com
обсуждение исходный текст
Ответ на Salt in encrypted password in pg_shadow  (David Garamond <lists@zara.6.isreserved.com>)
Ответы Re: Salt in encrypted password in pg_shadow  (Tom Lane <tgl@sss.pgh.pa.us>)
Список pgsql-general
Tom Lane wrote:
>>Many people use short and easy-to-guess passwords (remember we're not
>>talking about the superuser only here), so the dictionary attack can be
>>more effective than people think.
>
> And that responds to the speed argument how?  I quite agree that a
> guessable password is risky, but putting in a random salt offers no
> real advantage if the salt has to be stored in the same place as the
> encrypted password.

Hm, I thought the purpose of salt is generally well understood? A
well-known string such as "postgres" is *not* a good salt at all.

Here's a couple of pages that hopefully can explain better:

http://en.wikipedia.org/wiki/Dictionary_attack
http://en.wikipedia.org/wiki/Salt_(cryptography)

--
dave

В списке pgsql-general по дате отправления:

Предыдущее
От: Alvaro Herrera
Дата:
Сообщение: Re: Postgresql and scripting
Следующее
От: Tom Lane
Дата:
Сообщение: Re: Salt in encrypted password in pg_shadow