Re: Database users Passwords - Mailing list pgsql-general

From Jorge Godoy
Subject Re: Database users Passwords
Date
Msg-id 878xjek8by.fsf@ieee.org
Whole thread Raw
In response to Re: Database users Passwords  (Shane Ambler <pgsql@007Marketing.com>)
Responses Re: Database users Passwords
List pgsql-general
Shane Ambler <pgsql@007Marketing.com> writes:

> The only crypt I know of is the crypt command (FreeBSD has it at
> /usr/bin/crypt) and is also known as enigma. This is a two way encryption
> and is fast.
> If that is what he is using then decrypting will not be part of the time
> issue and is the basis of the advice I gave.

From the man page of the crypt that I have here:

================================================================================
GNU EXTENSION
       The glibc2 version of this function has the following additional
       features.  If salt is a character string starting with the three
       characters "$1$" followed by at most eight characters, and optionally
       terminated by "$", then instead of using the DES machine, the glibc
       crypt function uses an MD5-based algorithm, and outputs up to 34 bytes,
       namely "$1$<string>$", where "<string>" stands for the up to 8
       characters following "$1$" in the salt, followed by 22 bytes chosen
       from the set [a-zA-Z0-9./].  The entire key is significant here
       (instead of only the first 8 bytes).

       Programs using this function must be linked with -lcrypt.

CONFORMING TO
       SVID, X/OPEN, 4.3BSD, POSIX 1003.1-2001
================================================================================

Well...  I suppose DES is not Enigma, but I may be wrong.  I just quoted this
"extension" because it shows both algorithms used here.


--
Jorge Godoy      <jgodoy@gmail.com>


pgsql-general by date:

Previous
From: Shane Ambler
Date:
Subject: Re: Database users Passwords
Next
From: "Karen Hill"
Date:
Subject: Re: more anti-postgresql FUD