From owner-freebsd-security Fri Feb 14 00:10:05 1997 Return-Path: Received: (from root@localhost) by freefall.freebsd.org (8.8.5/8.8.5) id AAA16883 for security-outgoing; Fri, 14 Feb 1997 00:10:05 -0800 (PST) Received: from main.gbdata.com ([207.113.12.23]) by freefall.freebsd.org (8.8.5/8.8.5) with ESMTP id AAA16855 for ; Fri, 14 Feb 1997 00:09:57 -0800 (PST) Received: (from gclarkii@localhost) by main.gbdata.com (8.8.5/8.6.9) id CAA26293; Fri, 14 Feb 1997 02:11:23 -0600 (CST) From: Gary Clark II Message-Id: <199702140811.CAA26293@main.gbdata.com> Subject: Re: blowfish passwords in FreeBSD To: imp@village.org (Warner Losh) Date: Fri, 14 Feb 1997 02:11:22 -0600 (CST) Cc: security@freebsd.org In-Reply-To: from Warner Losh at "Feb 13, 97 11:58:56 pm" X-Mailer: ELM [version 2.4ME+ PL22 (25)] MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: owner-security@freebsd.org X-Loop: FreeBSD.org Precedence: bulk Warner Losh wrote: > > OpenBSD just committed a new encryption method using blowfish. This > has a much larger salt space as well as a much harder to break > encryption scheme. Preliminary indications are that it looks really > good. They implemented this much like md5, but with its own code. > > I think we should bring this into FreeBSD. What do others think? > > Warner > Warner, Did they post the location of any white papers? I'd like to read about it. Gary -- Gary Clark II (N5VMF) | I speak only for myself and "maybe" my company gclarkii@GBData.COM | Member of the FreeBSD Doc Team Providing Internet and ISP startups mail info@GBData.COM for information FreeBSD FAQ at ftp://ftp.FreeBSD.ORG/pub/FreeBSD/docs/freebsd-faq.ascii