On Wed, Aug 15, 2012 at 11:37:04AM -0400, Andrew Dunstan wrote: > > On 08/15/2012 11:22 AM, Joe Conway wrote: > >On 08/15/2012 06:48 AM, Tom Lane wrote: > >>>On Wed, Aug 15, 2012 at 6:11 AM, Bruce Momjian <br...@momjian.us> wrote: > >>>>Is there a TODO here? > >>If anybody's concerned about the security of our password storage, > >>they'd be much better off working on improving the length and randomness > >>of the salt string than replacing the md5 hash per se. > >Or change to an md5 HMAC rather than straight md5 with salt. Last I > >checked (which admittedly was a while ago) there were still no known > >cryptographic weaknesses associated with an HMAC based on md5. > > > > > > Possibly. I still think the right time to revisit this whole area > will be when the NIST Hash Function competition ends supposedly > later this year. See > <http://csrc.nist.gov/groups/ST/hash/timeline.html>. At that time we > should probably consider moving our password handling to use the new > standard function.
Are we really going to be comforable with a algorithm that is new? -- Bruce Momjian <br...@momjian.us> http://momjian.us EnterpriseDB http://enterprisedb.com + It's impossible for everything to be true. + -- Sent via pgsql-hackers mailing list (pgsql-hackers@postgresql.org) To make changes to your subscription: http://www.postgresql.org/mailpref/pgsql-hackers