Re: Salt in encrypted password in pg_shadow
От | Tom Lane |
---|---|
Тема | Re: Salt in encrypted password in pg_shadow |
Дата | |
Msg-id | 15601.1094618019@sss.pgh.pa.us обсуждение исходный текст |
Ответ на | Re: Salt in encrypted password in pg_shadow (Steve Atkins <steve@blighty.com>) |
Ответы |
Re: Salt in encrypted password in pg_shadow
Re: Salt in encrypted password in pg_shadow |
Список | pgsql-general |
Steve Atkins <steve@blighty.com> writes: > If we need to tweak the authentication protocol _anyway_ at some > point it'd be great to improve things. But until then... not worth > the pain. I've been hearing rumblings that MD5 and all other known crypto protocols are known vulnerable since the latest crypto symposiums. (Not that we didn't all suspect the NSA et al could break 'em, but now they've told us exactly how they do it.) So as soon as someone wheels up a new crypto hash method that looks trustworthy, we can invent a new auth protocol and maybe throw in another level of random salting while we're at it. But right now I doubt it's worth the effort :-( regards, tom lane
В списке pgsql-general по дате отправления: