Re: Replace current implementations in crypt() and gen_salt() to OpenSSL

Поиск
Список
Период
Сортировка
От Peter Eisentraut
Тема Re: Replace current implementations in crypt() and gen_salt() to OpenSSL
Дата
Msg-id bdf58b2c-71da-4129-bb63-e6c4f62051ad@eisentraut.org
обсуждение исходный текст
Ответ на Re: Replace current implementations in crypt() and gen_salt() to OpenSSL  (Daniel Gustafsson <daniel@yesql.se>)
Ответы Re: Replace current implementations in crypt() and gen_salt() to OpenSSL  (Daniel Gustafsson <daniel@yesql.se>)
Список pgsql-hackers
On 16.02.24 10:16, Daniel Gustafsson wrote:
>> 2. The crypt() and gen_salt() methods built on top of them (modes of operation, kind of) are not FIPS-compliant.
> I wonder if it's worth trying to make pgcrypto disallow non-FIPS compliant
> ciphers when the compiled against OpenSSL is running with FIPS mode enabled, or
> raise a WARNING when used?  It seems rather unlikely that someone running
> OpenSSL with FIPS=yes want to use our DES cipher without there being an error
> or misconfiguration somewhere.

I wonder on what level this kind of check would be done.  For example, 
the password hashing done for SCRAM is not FIPS-compliant either, but 
surely we don't want to disallow that.  Maybe this should be done on the 
level of block ciphers.  So if someone wanted to add a "crypt-aes" 
module, that would then continue to work.



В списке pgsql-hackers по дате отправления:

Предыдущее
От: jian he
Дата:
Сообщение: Re: POC, WIP: OR-clause support for indexes
Следующее
От: Peter Eisentraut
Дата:
Сообщение: Re: table inheritance versus column compression and storage settings