Date: Fri, 14 Feb 1997 09:50:43 +0100 From: Poul-Henning Kamp <phk@critter.dk.tfs.com> To: Warner Losh <imp@village.org> Cc: security@FreeBSD.ORG Subject: Re: blowfish passwords in FreeBSD Message-ID: <8676.855910243@critter.dk.tfs.com> In-Reply-To: Your message of "Thu, 13 Feb 1997 23:58:56 MST." <E0vvHbl-00026f-00@rover.village.org>
next in thread | previous in thread | raw e-mail | index | archive | help
In message <E0vvHbl-00026f-00@rover.village.org>, Warner Losh writes: > >OpenBSD just committed a new encryption method using blowfish. This >has a much larger salt space as well as a much harder to break >encryption scheme. Preliminary indications are that it looks really >good. They implemented this much like md5, but with its own code. > >I think we should bring this into FreeBSD. What do others think? We already have a submission for SSH (?) passwords in a PR, they should be merged and documented. -- Poul-Henning Kamp | phk@FreeBSD.ORG FreeBSD Core-team. http://www.freebsd.org/~phk | phk@login.dknet.dk Private mailbox. whois: [PHK] | phk@tfs.com TRW Financial Systems, Inc. Power and ignorance is a disgusting cocktail.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?8676.855910243>