Re: sha1, sha2 functions into core? - Mailing list pgsql-hackers

From Andrew Dunstan
Subject Re: sha1, sha2 functions into core?
Date
Msg-id 502BC7B5.8080206@dunslane.net
Whole thread Raw
In response to Re: sha1, sha2 functions into core?  (Bruce Momjian <bruce@momjian.us>)
List pgsql-hackers
On 08/15/2012 11:48 AM, Bruce Momjian wrote:
> On Wed, Aug 15, 2012 at 11:37:04AM -0400, Andrew Dunstan wrote:
>> On 08/15/2012 11:22 AM, Joe Conway wrote:
>>> On 08/15/2012 06:48 AM, Tom Lane wrote:
>>>>> On Wed, Aug 15, 2012 at 6:11 AM, Bruce Momjian <bruce@momjian.us> wrote:
>>>>>> Is there a TODO here?
>>>> If anybody's concerned about the security of our password storage,
>>>> they'd be much better off working on improving the length and randomness
>>>> of the salt string than replacing the md5 hash per se.
>>> Or change to an md5 HMAC rather than straight md5 with salt. Last I
>>> checked (which admittedly was a while ago) there were still no known
>>> cryptographic weaknesses associated with an HMAC based on md5.
>>>
>>
>>
>> Possibly. I still think the right time to revisit this whole area
>> will be when the NIST Hash Function competition ends supposedly
>> later this year. See
>> <http://csrc.nist.gov/groups/ST/hash/timeline.html>. At that time we
>> should probably consider moving our password handling to use the new
>> standard function.
> Are we really going to be comforable with a algorithm that is new?
>


The only thing that will be new about it will be that it's the new 
standard. There is a reason these crypto function competitions runs for 
quite a few years.

cheers

andrew




pgsql-hackers by date:

Previous
From: Tom Lane
Date:
Subject: Re: [COMMITTERS] pgsql: Revert "commit_delay" change; just add comment that we don't hav
Next
From: Joe Conway
Date:
Subject: Re: sha1, sha2 functions into core?