Re: [HACKERS] Hashing passwords (was Updated TODO list) - Mailing list pgsql-hackers

From Gene Sokolov
Subject Re: [HACKERS] Hashing passwords (was Updated TODO list)
Date
Msg-id 065901beca16$66c6abe0$0d8cdac3@aktrad.ru
Whole thread Raw
In response to Re: [HACKERS] Hashing passwords (was Updated TODO list)  (Louis Bertrand <louis@bertrandtech.on.ca>)
Responses Re: [HACKERS] Hashing passwords (was Updated TODO list)
List pgsql-hackers
> It would be nice if the password scheme you finally settle on can be
> optionally replaced (compile-time) by the password hash available native
> on the OS. In the case of OpenBSD, the Blowfish-based replacement for the
> DES or MD5 based crypt(3) is better suited to resisting dictionary and
> other offline attacks by fast processors.

Once you say "strong encryption", you also say "export controls", "wasenaar"
and "avoid it if you can". It means PgSQL team would have to maintain two
distributions - one for the US and one for the rest of the world. It's not
like it cannot be done. I just see no benefit in using encryption instead of
hashing. There is no need for DES or Blowfish to justify the pain.

Gene Sokolov.




pgsql-hackers by date:

Previous
From: "Gene Sokolov"
Date:
Subject: Re: [HACKERS] Hashing passwords (was Updated TODO list)
Next
From: "Mark Hollomon"
Date:
Subject: Re: [HACKERS] Hashing passwords (was Updated TODO list)