Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 11 Jun 2012 18:32:53 +0200
From:      =?utf-8?Q?Dag-Erling_Sm=C3=B8rgrav?= <des@des.no>
To:        Gleb Kurtsou <gleb.kurtsou@gmail.com>
Cc:        freebsd-security@freebsd.org, Lev Serebryakov <lev@freebsd.org>, "Simon L. B. Nielsen" <simon@FreeBSD.org>
Subject:   Re: Default password hash
Message-ID:  <86ipexn70q.fsf@ds4.des.no>
In-Reply-To: <20120611162423.GA27001@reks> (Gleb Kurtsou's message of "Mon, 11 Jun 2012 19:24:23 %2B0300")
References:  <86r4tqotjo.fsf@ds4.des.no> <6E26E03B-8D1D-44D3-B94E-0552BE5CA894@FreeBSD.org> <734419687.20120611144402@serebryakov.spb.ru> <CAC8HS2EKQTWSE%2BtD5Y68E6YRiJjjogSEgXPBeqDH3b-cO_-DAQ@mail.gmail.com> <20120611162423.GA27001@reks>

next in thread | previous in thread | raw e-mail | index | archive | help
Gleb Kurtsou <gleb.kurtsou@gmail.com> writes:
> In other words, currently there is no benefit in switch default
> algorithm to relatively new crypt_sha512 vs 256-iterations
> crypt_blowfish supported on RELENG_7.

>From a cryptographic point of view, perhaps, but they are both better
than the current default (md5), and all else being equal, I favor the
option that maximises compatibility, i.e. sha512.

DES
--=20
Dag-Erling Sm=C3=B8rgrav - des@des.no



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?86ipexn70q.fsf>