The Passlib documentation has moved to https://passlib.readthedocs.io

passlib.hash.postgres_md5 - PostgreSQL MD5 password hash

Danger

This algorithm is not considered secure by modern standards. It should only be used when verifying existing hashes, or when interacting with applications that require this format. For new code, see the list of recommended hashes.

This class implements the md5-based hash algorithm used by PostgreSQL to store its user account passwords. This scheme was introduced in PostgreSQL 7.2; prior to this PostgreSQL stored its password in plain text. Users will most likely find the frontend provided by passlib.apps to be more useful than accessing this class directly. That aside, this class can be used directly as follows:

>>> from passlib.hash import postgres_md5

>>> # hash password using specified username
>>> hash = postgres_md5.hash("password", user="username")
>>> hash
'md55a231fcdb710d73268c4f44283487ba2'

>>> # verify correct password
>>> postgres_md5.verify("password", hash, user="username")
True
>>> # verify correct password w/ wrong username
>>> postgres_md5.verify("password", hash, user="somebody")
False
>>> # verify incorrect password
>>> postgres_md5.verify("password", hash, user="username")
False

See also

the generic PasswordHash usage examples

Interface

class passlib.hash.postgres_md5

This class implements the Postgres MD5 Password hash, and follows the PasswordHash API.

It does a single round of hashing, and relies on the username as the salt.

The hash(), genhash(), and verify() methods all require the following additional contextual keywords:

Parameters:user (str) – name of postgres user account this password is associated with.

Format & Algorithm

Postgres-MD5 hashes all have the format md5checksum, where checksum is 32 hexadecimal digits, encoding a 128-bit checksum. This checksum is the MD5 message digest of the password concatenated with the username.

Security Issues

This algorithm it not suitable for any use besides manipulating existing PostgreSQL account passwords, due to the following flaws:

  • Its use of the username as a salt value means that common usernames (e.g. admin, root, postgres) will occur more frequently as salts, weakening the effectiveness of the salt in foiling pre-computed tables.
  • Since the keyspace of user+password is still a subset of ascii characters, existing MD5 lookup tables have an increased chance of being able to reverse common hashes.
  • Its simplicity makes high-speed brute force attacks much more feasible [3] .

Footnotes

[1]Discussion leading up to design of algorithm - http://archives.postgresql.org/pgsql-hackers/2001-06/msg00952.php
[2]Message explaining postgres md5 hash algorithm - http://archives.postgresql.org/pgsql-php/2003-01/msg00021.php
[3]Blog post demonstrating brute-force attack http://pentestmonkey.net/blog/cracking-postgres-hashes/.