You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Beginning with [!INCLUDE [sssql11-md](sssql11-md.md)], SQL Server and Azure SQL DB used a SHA-512 hash combined with a 32-bit random and unique salt. This method made it statistically infeasible for attackers to deduce passwords.
12
12
13
-
[!INCLUDE [sssql25-md](sssql25-md.md)] introduces an iterated hash algorithm, RFC2898, also known as a *password-based key derivation function* (PBKDF). This algorithm still uses SHA-512 but hashes the password multiple times (100,000 iterations), significantly slowing down brute-force attacks. This change enhances password protection in response to evolving security threats and helps customers comply with NIST SP 800-63b guidelines. This security enhancement uses a stronger hashing algorithm, which may slightly increase login time for SQL Authentication logins. The impact is generally negligible in environments with connection pooling, but may be more noticeable in scenarios without pooling or where login latency is closely monitored.
13
+
[!INCLUDE [sssql25-md](sssql25-md.md)] introduces an iterated hash algorithm, RFC2898, also known as a *password-based key derivation function* (PBKDF). This algorithm still uses SHA-512 but hashes the password multiple times (100,000 iterations), significantly slowing down brute-force attacks. This change enhances password protection in response to evolving security threats and helps customers comply with NIST SP 800-63b guidelines. This security enhancement uses a stronger hashing algorithm, which may slightly increase login time for SQL Authentication logins. The impact is generally lower in environments with connection pooling, but may be more noticeable in scenarios without pooling or where login latency is closely monitored.
Copy file name to clipboardExpand all lines: docs/sql-server/sql-server-2025-known-issues.md
+9-2Lines changed: 9 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: "Known issues, causes, and workarounds for SQL Server 2025 Preview
4
4
author: MikeRayMSFT
5
5
ms.author: mikeray
6
6
ms.reviewer: randolphwest
7
-
ms.date: 08/27/2025
7
+
ms.date: 08/28/2025
8
8
ms.service: sql
9
9
ms.subservice: release-landing
10
10
ms.topic: troubleshooting-known-issue
@@ -33,6 +33,7 @@ This article describes known issues for [!INCLUDE [sssql25-md](../includes/sssql
33
33
-[SQL Server on Linux fails to start on machines with hybrid CPU architecture](#sql-server-on-linux-fails-to-start-on-machines-with-hybrid-cpu-architecture)
-[Local ONNX models not supported on Linux operating systems](#local-onnx-models-not-supported-on-linux-operating-systems)
36
+
-[PBKDF2 hashing algorithm can affect login performance](#pbkdf2-hashing-algorithm-can-affect-login-performance)
36
37
37
38
## Windows Arm64 not supported
38
39
@@ -199,7 +200,7 @@ PolyBase components can fail to start after upgrading to, or installing a new in
199
200
200
201
## PolyBase connections fail to external SQL Server source
201
202
202
-
[!INCLUDE [sssql25-md](../includes/sssql25-md.md)] PolyBase connections can fail to external SQL Server sources if the external data source was not[properly configured](../t-sql/statements/create-external-data-source-transact-sql.md#syntax-for-sql-server-2025-and-later-versions). Review the [PolyBase network encryption](../relational-databases/polybase/polybase-installation.md#polybase-network-encryption) documentation for more information.
203
+
[!INCLUDE [sssql25-md](../includes/sssql25-md.md)] PolyBase connections can fail to external SQL Server sources if the external data source isn't[properly configured](../t-sql/statements/create-external-data-source-transact-sql.md#syntax-for-sql-server-2025-and-later-versions). Review the [PolyBase network encryption](../relational-databases/polybase/polybase-installation.md#polybase-network-encryption) documentation for more information.
203
204
204
205
## SQL Server on Linux fails to start on machines with hybrid CPU architecture
205
206
@@ -221,6 +222,12 @@ If you want to use a Linux host operating system, you can work around the issue
221
222
222
223
[CREATE EXTERNAL MODEL](../t-sql/statements/create-external-model-transact-sql.md) local ONNX models hosted directly on the SQL Server aren't currently available for Linux on [!INCLUDE [sssql25-md](../includes/sssql25-md.md)] RC 0.
223
224
225
+
## PBKDF2 hashing algorithm can affect login performance
226
+
227
+
In [!INCLUDE [sssql25-md](../includes/sssql25-md.md)], password-based authentication uses PBKDF2 (RFC2898) as the default hashing algorithm. This enhancement improves password security by applying 100,000 iterations of SHA-512 hashing. The increased computational cost of PBKDF2 means slightly longer SQL Authentication login time. This effect is especially noticeable in environments without connection pooling, or where login latency is closely monitored. In pooled environments, the effect is typically minimal.
228
+
229
+
For more information, see [CREATE LOGIN](../t-sql/statements/create-login-transact-sql.md) and [Support for Iterated and Salted Hash Password Verifiers in SQL Server 2022 CU12](https://techcommunity.microsoft.com/blog/azuresqlblog/support-for-iterated-and-salted-hash-password-verifiers-in-sql-server-2022-cu12/4087155).
230
+
224
231
## Related content
225
232
226
233
-[What's new in SQL Server 2025 Preview](what-s-new-in-sql-server-2025.md)
0 commit comments