From owner-freebsd-security Fri Feb 14 10:24:07 1997 Return-Path: Received: (from root@localhost) by freefall.freebsd.org (8.8.5/8.8.5) id KAA21809 for security-outgoing; Fri, 14 Feb 1997 10:24:07 -0800 (PST) Received: from phaedrus.uchicago.edu (phaedrus.uchicago.edu [128.135.21.10]) by freefall.freebsd.org (8.8.5/8.8.5) with ESMTP id KAA21747 for ; Fri, 14 Feb 1997 10:24:01 -0800 (PST) Received: (from sfarrell@localhost) by phaedrus.uchicago.edu (8.8.5/8.7.3) id MAA27773; Fri, 14 Feb 1997 12:30:23 -0600 To: Brandon Gillespie Cc: Warner Losh , security@freebsd.org Subject: Re: blowfish passwords in FreeBSD References: Mime-Version: 1.0 (generated by tm-edit 7.89) Content-Type: text/plain; charset=US-ASCII From: stephen farrell Date: 14 Feb 1997 12:30:22 -0600 In-Reply-To: Brandon Gillespie's message of Fri, 14 Feb 1997 09:21:17 -0700 (MST) Message-ID: <87sp2zkzpd.fsf@phaedrus.uchicago.edu> Lines: 17 X-Mailer: Gnus v5.2.25/XEmacs 19.14 Sender: owner-security@freebsd.org X-Loop: FreeBSD.org Precedence: bulk Brandon Gillespie writes: > > On Thu, 13 Feb 1997, Warner Losh wrote: > > OpenBSD just committed a new encryption method using blowfish. This > > has a much larger salt space as well as a much harder to break > > encryption scheme. Preliminary indications are that it looks really > > good. They implemented this much like md5, but with its own code. > > > > I think we should bring this into FreeBSD. What do others think? > > How does it compare to SHA? We've had SHA encryption sitting in PR for a > few months now, it uses the $2$ 'id'. here's a pretty cool URL for htis stuff: