On Tue, Feb 10, 2015 at 10:32 PM, Peter Geoghegan <p...@heroku.com> wrote:

> On Tue, Feb 10, 2015 at 4:21 PM, Robert Haas <robertmh...@gmail.com>
> wrote:
> > Although the patch was described as relatively easy to write, it never
> > went anywhere, because it *replaced* MD5 authentication with bcrypt,
> > which would be a big problem for existing clients.  It seems clear
> > that we should add something new and not immediately kill off what
> > we've already got, so that people can transition smoothly.  An idea I
> > just had today is to keep using basically the same system that we are
> > currently using for MD5, but with a stronger hash algorithm, like
> > SHA-1 or SHA-2 (which includes SHA-224, SHA-256, SHA-384, and
> > SHA-512).  Those are slower, but my guess is that even SHA-512 is not
> > enough slower for anybody to care very much, and if they do, well
> > that's another reason to make use of the new stuff optional.
>
> I believe that a big advantage of bcrypt for authentication is the
> relatively high memory requirements. This frustrates GPU based
> attacks.
>
>
> --
> Peter Geoghegan
>
>
> --
> Sent via pgsql-hackers mailing list (pgsql-hackers@postgresql.org)
> To make changes to your subscription:
> http://www.postgresql.org/mailpref/pgsql-hackers
>

There's also scrypt, which can be tuned for both memory and compute
requirements.

I don't think the "password storing best practices" apply to db connection
authentication. So SHA256 (or any other non terribly broken hash) is
probably fine for Pg.

Reply via email to