Re: Support getrandom() for pg_strong_random() source - Mailing list pgsql-hackers

From Jacob Champion
Subject Re: Support getrandom() for pg_strong_random() source
Date
Msg-id CAOYmi+kRVoiX5hTFo_4+a5aOFd50kL+feVEe7j_-8qYyZNfrSw@mail.gmail.com
Whole thread Raw
In response to Re: Support getrandom() for pg_strong_random() source  (Daniel Gustafsson <daniel@yesql.se>)
List pgsql-hackers
On Tue, Oct 7, 2025 at 1:26 AM Daniel Gustafsson <daniel@yesql.se> wrote:
> Using a UUID as salt would perhaps be one scenario which would turn the RNG
> used for UUIDs into security functionality according to the FIPS definitions?

I don't know. One might idly hope that using a UUID for a salt would
itself be a FIPS violation :D but it's probably not.

I guess there's a bit of a procedural question bundled in with this
(that is getting ever further afield of Sawada-san's proposal). If we
happen to use a CSPRNG to generate some sort of non-security-related
output, and then someone uses that output to seed some crypto, do we
consider ourselves on the hook if we change the implementation? The
UUID RFCs are pretty clear that you're not supposed to treat them as
unguessable even if an ideal implementation is, and I'm starting to
agree with Joe that we need to document that ourselves.

--Jacob



pgsql-hackers by date:

Previous
From: Tom Lane
Date:
Subject: Re: Add RESPECT/IGNORE NULLS and FROM FIRST/LAST options
Next
From: Jacob Champion
Date:
Subject: Re: Support getrandom() for pg_strong_random() source