summaryrefslogtreecommitdiff
path: root/docs/lib
diff options
context:
space:
mode:
authorEli Collins <elic@assurancetechnologies.com>2011-05-03 12:07:27 -0400
committerEli Collins <elic@assurancetechnologies.com>2011-05-03 12:07:27 -0400
commitd5a3929ff9916a1bc17e1b071b4bf8cac81bc2da (patch)
tree14f3b1846738a68632e2b603484946ac05d53a83 /docs/lib
parent103e0d85f8d779c7fc6ea296697e6274b545aa41 (diff)
downloadpasslib-d5a3929ff9916a1bc17e1b071b4bf8cac81bc2da.tar.gz
minor doc changes
Diffstat (limited to 'docs/lib')
-rw-r--r--docs/lib/passlib.hash.postgres_md5.rst4
1 files changed, 3 insertions, 1 deletions
diff --git a/docs/lib/passlib.hash.postgres_md5.rst b/docs/lib/passlib.hash.postgres_md5.rst
index 3c24f07..9d8d7ab 100644
--- a/docs/lib/passlib.hash.postgres_md5.rst
+++ b/docs/lib/passlib.hash.postgres_md5.rst
@@ -62,7 +62,7 @@ PostgreSQL account passwords, due to the following flaws:
* Since the keyspace of ``user+password`` is still a subset of ascii characters,
existing MD5 lookup tables have an increased chance of being able to reverse common hashes.
-* It's simplicity makes high-speed brute force attacks much more feasible.
+* It's simplicity makes high-speed brute force attacks much more feasible [#brute]_ .
References
==========
@@ -71,3 +71,5 @@ References
.. [#] Message explaining postgres md5 hash algorithm -
`<http://archives.postgresql.org/pgsql-php/2003-01/msg00021.php>`_
+
+.. [#brute] Blog post demonstrating brute-force attack `<http://pentestmonkey.net/blog/cracking-postgres-hashes/>`_.