Re: [HACKERS] Hashing passwords (was Updated TODO list)

Поиск
Список
Период
Сортировка
От Peter Eisentraut
Тема Re: [HACKERS] Hashing passwords (was Updated TODO list)
Дата
Msg-id Pine.LNX.4.10.9907120933190.4521-100000@saxony.pathwaynet.com
обсуждение исходный текст
Ответ на Re: [HACKERS] Hashing passwords (was Updated TODO list)  (Louis Bertrand <louis@bertrandtech.on.ca>)
Список pgsql-hackers
On Fri, 9 Jul 1999, Louis Bertrand wrote:

> It would be nice if the password scheme you finally settle on can be
> optionally replaced (compile-time) by the password hash available native
> on the OS. In the case of OpenBSD, the Blowfish-based replacement for the
> DES or MD5 based crypt(3) is better suited to resisting dictionary and
> other offline attacks by fast processors.
> 
> This suggestion is useful in case the shadow password file is compromised.
> It is independent of any challenge-response protocol you apply upstream.

Perhaps one could also allow the use of PAM where available. That would
make things infinitely easier for administrators.

-- 
Peter Eisentraut
PathWay Computing, Inc.



В списке pgsql-hackers по дате отправления:

Предыдущее
От: "Gene Sokolov"
Дата:
Сообщение: Re: [HACKERS] Re: Hashing passwords (was Updated TODO list)
Следующее
От: Maarten Boekhold
Дата:
Сообщение: Re: [HACKERS] Fwd: Joins and links