Re: Salt in encrypted password in pg_shadow
От | Mike Nolan |
---|---|
Тема | Re: Salt in encrypted password in pg_shadow |
Дата | |
Msg-id | 200409080459.i884xPau029234@gw.tssi.com обсуждение исходный текст |
Ответ на | Re: Salt in encrypted password in pg_shadow (Tom Lane <tgl@sss.pgh.pa.us>) |
Список | pgsql-general |
> So as soon as someone wheels up a new crypto hash method that looks > trustworthy, we can invent a new auth protocol and maybe throw in > another level of random salting while we're at it. But right now > I doubt it's worth the effort :-( A relatively simple enhancement would be to use some or all of the user name as the salt. That makes reverse engineering the passwords a bit harder because there are multiple salts being used. I suspect that with the speed of modern microprocessors that nearly any crypto scheme is breakable using a few thousand dollars worth of hardware and a few hours of time. If the NSA has built in shortcuts to their sanctioned algorithms, that just makes the cracking process faster. I know of an ecryption technique developed by a friend of mine, a retired mathematician, that would probably be sufficiently robust. It uses group theory to permutate the bit field and has both reversible and non-reversible forms. It would probably be subject to export restrictions. As I recall, he couldn't even send a copy of the program to his son in Greece without State Department approval. But as long as people use vulnerable passwords, there is no password encryption scheme that isn't vulnerable to attack, with or without salt. Challenge/response and one-time password schemes are more secure but a lot more hassle for users. -- Mike Nolan
В списке pgsql-general по дате отправления: