Lokasi ngalangkungan proxy:   [ UP ]  
[Ngawartoskeun bug]   [Panyetelan cookie]                
Skip to content

Commit 2567cda

Browse files
Merge pull request #35140 from Pietervanhove/PBKDFKnownIssue
PBKDF Known Issue
2 parents cf0bd86 + 22dc9fd commit 2567cda

2 files changed

Lines changed: 11 additions & 4 deletions

File tree

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
author: MikeRayMSFT
33
ms.author: mikeray
4-
ms.date: 01/29/2024
4+
ms.date: 08/28/2025
55
ms.service: sql
66
ms.topic: include
77
ms.custom:
@@ -10,4 +10,4 @@ ms.custom:
1010

1111
Beginning with [!INCLUDE [sssql11-md](sssql11-md.md)], SQL Server and Azure SQL DB used a SHA-512 hash combined with a 32-bit random and unique salt. This method made it statistically infeasible for attackers to deduce passwords.
1212

13-
[!INCLUDE [sssql25-md](sssql25-md.md)] introduces an iterated hash algorithm, RFC2898, also known as a *password-based key derivation function* (PBKDF). This algorithm still uses SHA-512 but hashes the password multiple times (100,000 iterations), significantly slowing down brute-force attacks. This change enhances password protection in response to evolving security threats and helps customers comply with NIST SP 800-63b guidelines. This security enhancement uses a stronger hashing algorithm, which may slightly increase login time for SQL Authentication logins. The impact is generally negligible in environments with connection pooling, but may be more noticeable in scenarios without pooling or where login latency is closely monitored.
13+
[!INCLUDE [sssql25-md](sssql25-md.md)] introduces an iterated hash algorithm, RFC2898, also known as a *password-based key derivation function* (PBKDF). This algorithm still uses SHA-512 but hashes the password multiple times (100,000 iterations), significantly slowing down brute-force attacks. This change enhances password protection in response to evolving security threats and helps customers comply with NIST SP 800-63b guidelines. This security enhancement uses a stronger hashing algorithm, which may slightly increase login time for SQL Authentication logins. The impact is generally lower in environments with connection pooling, but may be more noticeable in scenarios without pooling or where login latency is closely monitored.

docs/sql-server/sql-server-2025-known-issues.md

Lines changed: 9 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: "Known issues, causes, and workarounds for SQL Server 2025 Preview
44
author: MikeRayMSFT
55
ms.author: mikeray
66
ms.reviewer: randolphwest
7-
ms.date: 08/27/2025
7+
ms.date: 08/28/2025
88
ms.service: sql
99
ms.subservice: release-landing
1010
ms.topic: troubleshooting-known-issue
@@ -33,6 +33,7 @@ This article describes known issues for [!INCLUDE [sssql25-md](../includes/sssql
3333
- [SQL Server on Linux fails to start on machines with hybrid CPU architecture](#sql-server-on-linux-fails-to-start-on-machines-with-hybrid-cpu-architecture)
3434
- [Linux PolyBase Network encryption enabled fails](#linux-polybase-network-encryption-enabled-fails)
3535
- [Local ONNX models not supported on Linux operating systems](#local-onnx-models-not-supported-on-linux-operating-systems)
36+
- [PBKDF2 hashing algorithm can affect login performance](#pbkdf2-hashing-algorithm-can-affect-login-performance)
3637

3738
## Windows Arm64 not supported
3839

@@ -199,7 +200,7 @@ PolyBase components can fail to start after upgrading to, or installing a new in
199200

200201
## PolyBase connections fail to external SQL Server source
201202

202-
[!INCLUDE [sssql25-md](../includes/sssql25-md.md)] PolyBase connections can fail to external SQL Server sources if the external data source was not [properly configured](../t-sql/statements/create-external-data-source-transact-sql.md#syntax-for-sql-server-2025-and-later-versions). Review the [PolyBase network encryption](../relational-databases/polybase/polybase-installation.md#polybase-network-encryption) documentation for more information.
203+
[!INCLUDE [sssql25-md](../includes/sssql25-md.md)] PolyBase connections can fail to external SQL Server sources if the external data source isn't [properly configured](../t-sql/statements/create-external-data-source-transact-sql.md#syntax-for-sql-server-2025-and-later-versions). Review the [PolyBase network encryption](../relational-databases/polybase/polybase-installation.md#polybase-network-encryption) documentation for more information.
203204

204205
## SQL Server on Linux fails to start on machines with hybrid CPU architecture
205206

@@ -221,6 +222,12 @@ If you want to use a Linux host operating system, you can work around the issue
221222

222223
[CREATE EXTERNAL MODEL](../t-sql/statements/create-external-model-transact-sql.md) local ONNX models hosted directly on the SQL Server aren't currently available for Linux on [!INCLUDE [sssql25-md](../includes/sssql25-md.md)] RC 0.
223224

225+
## PBKDF2 hashing algorithm can affect login performance
226+
227+
In [!INCLUDE [sssql25-md](../includes/sssql25-md.md)], password-based authentication uses PBKDF2 (RFC2898) as the default hashing algorithm. This enhancement improves password security by applying 100,000 iterations of SHA-512 hashing. The increased computational cost of PBKDF2 means slightly longer SQL Authentication login time. This effect is especially noticeable in environments without connection pooling, or where login latency is closely monitored. In pooled environments, the effect is typically minimal.
228+
229+
For more information, see [CREATE LOGIN](../t-sql/statements/create-login-transact-sql.md) and [Support for Iterated and Salted Hash Password Verifiers in SQL Server 2022 CU12](https://techcommunity.microsoft.com/blog/azuresqlblog/support-for-iterated-and-salted-hash-password-verifiers-in-sql-server-2022-cu12/4087155).
230+
224231
## Related content
225232

226233
- [What's new in SQL Server 2025 Preview](what-s-new-in-sql-server-2025.md)

0 commit comments

Comments
 (0)