From owner-freebsd-security Fri Feb 14 00:49:27 1997 Return-Path: Received: (from root@localhost) by freefall.freebsd.org (8.8.5/8.8.5) id AAA18883 for security-outgoing; Fri, 14 Feb 1997 00:49:27 -0800 (PST) Received: from bofh.cybercity.dk (relay.cybercity.dk [195.8.128.254]) by freefall.freebsd.org (8.8.5/8.8.5) with ESMTP id AAA18876 for ; Fri, 14 Feb 1997 00:49:24 -0800 (PST) Received: from critter.dk.tfs.com ([140.145.230.252]) by bofh.cybercity.dk (8.8.3/8.7.3) with ESMTP id JAA09014; Fri, 14 Feb 1997 09:51:44 +0100 (MET) Received: from critter.dk.tfs.com (localhost [127.0.0.1]) by critter.dk.tfs.com (8.8.2/8.8.2) with ESMTP id JAA08678; Fri, 14 Feb 1997 09:50:43 +0100 (MET) To: Warner Losh cc: security@FreeBSD.ORG Subject: Re: blowfish passwords in FreeBSD In-reply-to: Your message of "Thu, 13 Feb 1997 23:58:56 MST." Date: Fri, 14 Feb 1997 09:50:43 +0100 Message-ID: <8676.855910243@critter.dk.tfs.com> From: Poul-Henning Kamp Sender: owner-security@FreeBSD.ORG X-Loop: FreeBSD.org Precedence: bulk In message , Warner Losh writes: > >OpenBSD just committed a new encryption method using blowfish. This >has a much larger salt space as well as a much harder to break >encryption scheme. Preliminary indications are that it looks really >good. They implemented this much like md5, but with its own code. > >I think we should bring this into FreeBSD. What do others think? We already have a submission for SSH (?) passwords in a PR, they should be merged and documented. -- Poul-Henning Kamp | phk@FreeBSD.ORG FreeBSD Core-team. http://www.freebsd.org/~phk | phk@login.dknet.dk Private mailbox. whois: [PHK] | phk@tfs.com TRW Financial Systems, Inc. Power and ignorance is a disgusting cocktail.