Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 14 Feb 1997 09:50:43 +0100
From:      Poul-Henning Kamp <phk@critter.dk.tfs.com>
To:        Warner Losh <imp@village.org>
Cc:        security@FreeBSD.ORG
Subject:   Re: blowfish passwords in FreeBSD 
Message-ID:  <8676.855910243@critter.dk.tfs.com>
In-Reply-To: Your message of "Thu, 13 Feb 1997 23:58:56 MST." <E0vvHbl-00026f-00@rover.village.org> 

next in thread | previous in thread | raw e-mail | index | archive | help
In message <E0vvHbl-00026f-00@rover.village.org>, Warner Losh writes:
>
>OpenBSD just committed a new encryption method using blowfish.  This
>has a much larger salt space as well as a much harder to break
>encryption scheme.  Preliminary indications are that it looks really
>good.  They implemented this much like md5, but with its own code.
>
>I think we should bring this into FreeBSD.  What do others think?

We already have a submission for SSH (?) passwords in a PR, they
should be merged and documented.

--
Poul-Henning Kamp           | phk@FreeBSD.ORG       FreeBSD Core-team.
http://www.freebsd.org/~phk | phk@login.dknet.dk    Private mailbox.
whois: [PHK]                | phk@tfs.com           TRW Financial Systems, Inc.
Power and ignorance is a disgusting cocktail.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?8676.855910243>