On Thu, 27 Jul 2006, Tom Lane wrote:

> Tomasz Ostrowski <[EMAIL PROTECTED]> writes:
> > * When somebody knows md5('secret_salt' || '5') he will be able to
> > easily compute
> >     md5('secret_salt' || '50')
> >     md5('secret_salt' || '51')
> 
> Sure, but can't you fix that by putting the secret part at the end?

I'm not so sure anymore. I think I was wrong... Forget it.

> > * PostgreSQL integers (as returned by nextval()) are 4 bytes. This
> > means only 32 bit strength - much too low for today computers.
> 
> Um, nextval returns int8.

OK. 64 bit should be enough.

> > * Any database user is most of the time able to read function
> > bodies, so anybody who is able co connect to your database will be
> > able to get your 'secret_salt' and then predict session id's.
> 
> Yeah, it's not clear where to hide the secret.

As somebody said it would be possible with restricted table and
security definer function.

Regards
Tometzky
-- 
...although Eating Honey was a very good thing to do, there was a
moment just before you began to eat it which was better than when you
were...
                                                      Winnie the Pooh

---------------------------(end of broadcast)---------------------------
TIP 5: don't forget to increase your free space map settings

Reply via email to