On Tue, Dec 22, 2020 at 04:13:06PM -0500, Bruce Momjian wrote: > On Tue, Dec 22, 2020 at 08:15:27PM +0000, Alastair Turner wrote: > > Hi Bruce > > > > In ckey_passphrase.sh.sample > > > > + > > +echo "$PASS" | sha256sum | cut -d' ' -f1 > > + > > > > Under the threat model discussed, a copy of the keyfile could be > > attacked offline. So getting from passphrase to DEKs should be as > > resource intensive as possible to slow down brute-force attempts. > > Instead of just a SHA hash, this should be at least a PBKDF2 (PKCS#5) > > I am satisfied with the security of SHA256.
Sorry, I should have said I am happy with a SHA512 HMAC in a 256-bit keyspace. -- Bruce Momjian <br...@momjian.us> https://momjian.us EnterpriseDB https://enterprisedb.com The usefulness of a cup is in its emptiness, Bruce Lee