The Passlib documentation has moved to https://passlib.readthedocs.io
passlib.hash.postgres_md5
- PostgreSQL MD5 password hash¶
Danger
This algorithm is not considered secure by modern standards. It should only be used when verifying existing hashes, or when interacting with applications that require this format. For new code, see the list of recommended hashes.
This class implements the md5-based hash algorithm used by PostgreSQL to store
its user account passwords. This scheme was introduced in PostgreSQL 7.2;
prior to this PostgreSQL stored its password in plain text.
Users will most likely find the frontend provided by passlib.apps
to be more useful than accessing this class directly.
That aside, this class can be used directly as follows:
>>> from passlib.hash import postgres_md5
>>> # hash password using specified username
>>> hash = postgres_md5.hash("password", user="username")
>>> hash
'md55a231fcdb710d73268c4f44283487ba2'
>>> # verify correct password
>>> postgres_md5.verify("password", hash, user="username")
True
>>> # verify correct password w/ wrong username
>>> postgres_md5.verify("password", hash, user="somebody")
False
>>> # verify incorrect password
>>> postgres_md5.verify("password", hash, user="username")
False
See also
the generic PasswordHash usage examples
Interface¶
-
class
passlib.hash.
postgres_md5
¶ This class implements the Postgres MD5 Password hash, and follows the PasswordHash API.
It does a single round of hashing, and relies on the username as the salt.
The
hash()
,genhash()
, andverify()
methods all require the following additional contextual keywords:Parameters: user (str) – name of postgres user account this password is associated with.
Format & Algorithm¶
Postgres-MD5 hashes all have the format md5checksum
,
where checksum
is 32 hexadecimal digits, encoding a 128-bit checksum.
This checksum is the MD5 message digest of the password concatenated with the username.
Security Issues¶
This algorithm it not suitable for any use besides manipulating existing PostgreSQL account passwords, due to the following flaws:
- Its use of the username as a salt value means that common usernames
(e.g.
admin
,root
,postgres
) will occur more frequently as salts, weakening the effectiveness of the salt in foiling pre-computed tables. - Since the keyspace of
user+password
is still a subset of ascii characters, existing MD5 lookup tables have an increased chance of being able to reverse common hashes. - Its simplicity makes high-speed brute force attacks much more feasible [3] .
Footnotes
[1] | Discussion leading up to design of algorithm - http://archives.postgresql.org/pgsql-hackers/2001-06/msg00952.php |
[2] | Message explaining postgres md5 hash algorithm - http://archives.postgresql.org/pgsql-php/2003-01/msg00021.php |
[3] | Blog post demonstrating brute-force attack http://pentestmonkey.net/blog/cracking-postgres-hashes/. |