Date: Fri, 14 Feb 1997 21:23:05 +0200 From: Mark Murray <mark@grondar.za> To: Poul-Henning Kamp <phk@critter.dk.tfs.com> Cc: security@freebsd.org Subject: Re: blowfish passwords in FreeBSD Message-ID: <199702141923.VAA18249@grackle.grondar.za>
next in thread | raw e-mail | index | archive | help
Poul-Henning Kamp wrote: > In message <E0vvHbl-00026f-00@rover.village.org>, Warner Losh writes: > > > >OpenBSD just committed a new encryption method using blowfish. This > >has a much larger salt space as well as a much harder to break > >encryption scheme. Preliminary indications are that it looks really > >good. They implemented this much like md5, but with its own code. > > > >I think we should bring this into FreeBSD. What do others think? > > We already have a submission for SSH (?) passwords in a PR, they > should be merged and documented. You mean SHA (secure hash algorithm). I have this FreeBSD ready. This method expands on PHK's MD5 passwd(5) scheme where an encrypted passwd that is not DES looks like $n$sssss$pppppppppp. Where n is a number 1=MD5 2=SHA 3-??=<unassigned> sssss is salt ppppppppp is the encrypred passwd. The code has hooks to make it extensible for other hash types. How does the OpenBSD Blowfish method fit into _that_? FWIW, our _current_ DES passwd scheme has a method that extends the salt dramatically. (this is documented). if the salt begins with an "_" underscore char, then the next 8 (!) chars are salt. They are (sort of) uudecoded to provide two 24 bit numbers. One is common-or- garden salt, the other is iteration count. You want someone to work hard do crack your password? Set the count high. Look in the secure/lib/libcrypt/test dir for test code and check out the secure crypt(3) manpage for docs. M -- Mark Murray PGP key fingerprint = 80 36 6E 40 83 D6 8A 36 This .sig is umop ap!sdn. BC 06 EA 0E 7A F2 CE CE
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199702141923.VAA18249>