Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 15 Jun 1999 00:58:11 -0600
From:      Warner Losh <imp@harmony.village.org>
To:        Poul-Henning Kamp <phk@critter.freebsd.dk>
Cc:        Holtor <holtor@yahoo.com>, freebsd-security@FreeBSD.ORG
Subject:   Re: DES & MD5? 
Message-ID:  <199906150658.AAA90712@harmony.village.org>
In-Reply-To: Your message of "Tue, 15 Jun 1999 08:49:04 %2B0200." <5182.929429344@critter.freebsd.dk> 
References:  <5182.929429344@critter.freebsd.dk>  

next in thread | previous in thread | raw e-mail | index | archive | help
In message <5182.929429344@critter.freebsd.dk> Poul-Henning Kamp writes:
: Uhm, sorry Warner, but that is not true.  A brute force attack on
: MD5 is many orders of magnitude slower than on DES.

Wouldn't that cause lots of messages to be logged about failed login
attempts?  I was talking about the case where no one can get the
encrypted passwords.  I do suppose this assumes that all the programs
that do login verification do syslogs failures...

I agree that MD5 is better when the possibility of disclosure of the
encrypted passwords exists...

Warner


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199906150658.AAA90712>