Re: Salt in encrypted password in pg_shadow - Mailing list pgsql-general

From Tom Lane
Subject Re: Salt in encrypted password in pg_shadow
Date
Msg-id 15601.1094618019@sss.pgh.pa.us
Whole thread Raw
In response to Re: Salt in encrypted password in pg_shadow  (Steve Atkins <steve@blighty.com>)
Responses Re: Salt in encrypted password in pg_shadow  (Mike Nolan <nolan@gw.tssi.com>)
Re: Salt in encrypted password in pg_shadow  (Bruno Wolff III <bruno@wolff.to>)
List pgsql-general
Steve Atkins <steve@blighty.com> writes:
> If we need to tweak the authentication protocol _anyway_ at some
> point it'd be great to improve things. But until then... not worth
> the pain.

I've been hearing rumblings that MD5 and all other known crypto
protocols are known vulnerable since the latest crypto symposiums.
(Not that we didn't all suspect the NSA et al could break 'em, but
now they've told us exactly how they do it.)

So as soon as someone wheels up a new crypto hash method that looks
trustworthy, we can invent a new auth protocol and maybe throw in
another level of random salting while we're at it.  But right now
I doubt it's worth the effort :-(

            regards, tom lane

pgsql-general by date:

Previous
From: Tom Lane
Date:
Subject: Re: Salt in encrypted password in pg_shadow
Next
From: Mike Nolan
Date:
Subject: Re: Salt in encrypted password in pg_shadow