diff options
| author | Eli Collins <elic@assurancetechnologies.com> | 2011-05-03 12:07:27 -0400 |
|---|---|---|
| committer | Eli Collins <elic@assurancetechnologies.com> | 2011-05-03 12:07:27 -0400 |
| commit | d5a3929ff9916a1bc17e1b071b4bf8cac81bc2da (patch) | |
| tree | 14f3b1846738a68632e2b603484946ac05d53a83 /docs/lib | |
| parent | 103e0d85f8d779c7fc6ea296697e6274b545aa41 (diff) | |
| download | passlib-d5a3929ff9916a1bc17e1b071b4bf8cac81bc2da.tar.gz | |
minor doc changes
Diffstat (limited to 'docs/lib')
| -rw-r--r-- | docs/lib/passlib.hash.postgres_md5.rst | 4 |
1 files changed, 3 insertions, 1 deletions
diff --git a/docs/lib/passlib.hash.postgres_md5.rst b/docs/lib/passlib.hash.postgres_md5.rst index 3c24f07..9d8d7ab 100644 --- a/docs/lib/passlib.hash.postgres_md5.rst +++ b/docs/lib/passlib.hash.postgres_md5.rst @@ -62,7 +62,7 @@ PostgreSQL account passwords, due to the following flaws: * Since the keyspace of ``user+password`` is still a subset of ascii characters, existing MD5 lookup tables have an increased chance of being able to reverse common hashes. -* It's simplicity makes high-speed brute force attacks much more feasible. +* It's simplicity makes high-speed brute force attacks much more feasible [#brute]_ . References ========== @@ -71,3 +71,5 @@ References .. [#] Message explaining postgres md5 hash algorithm - `<http://archives.postgresql.org/pgsql-php/2003-01/msg00021.php>`_ + +.. [#brute] Blog post demonstrating brute-force attack `<http://pentestmonkey.net/blog/cracking-postgres-hashes/>`_. |
