From owner-freebsd-security Fri Feb 14 11:28:28 1997 Return-Path: Received: (from root@localhost) by freefall.freebsd.org (8.8.5/8.8.5) id LAA25728 for security-outgoing; Fri, 14 Feb 1997 11:28:28 -0800 (PST) Received: from grackle.grondar.za (iRAe3PKMBYySwR6+GM0+jGSqJKD3IfQp@grackle.grondar.za [196.7.18.131]) by freefall.freebsd.org (8.8.5/8.8.5) with ESMTP id LAA25717 for ; Fri, 14 Feb 1997 11:28:21 -0800 (PST) Received: from grackle.grondar.za (PpyYfEtyltR3nsHCajfiSctJ4mfLy1lC@localhost [127.0.0.1]) by grackle.grondar.za (8.8.5/8.8.4) with ESMTP id VAA18273; Fri, 14 Feb 1997 21:27:58 +0200 (SAT) Message-Id: <199702141927.VAA18273@grackle.grondar.za> X-Mailer: exmh version 2.0gamma 1/27/96 To: Brandon Gillespie cc: security@freebsd.org Subject: Re: blowfish passwords in FreeBSD Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Date: Fri, 14 Feb 1997 21:27:55 +0200 From: Mark Murray Sender: owner-security@freebsd.org X-Loop: FreeBSD.org Precedence: bulk Brandon Gillespie wrote: > On Thu, 13 Feb 1997, Warner Losh wrote: > > OpenBSD just committed a new encryption method using blowfish. This > > has a much larger salt space as well as a much harder to break > > encryption scheme. Preliminary indications are that it looks really > > good. They implemented this much like md5, but with its own code. > > > > I think we should bring this into FreeBSD. What do others think? > > How does it compare to SHA? We've had SHA encryption sitting in PR for a > few months now, it uses the $2$ 'id'. I have your scheme commit-ready now. It looks like we'll have too merge in this as well. M -- Mark Murray PGP key fingerprint = 80 36 6E 40 83 D6 8A 36 This .sig is umop ap!sdn. BC 06 EA 0E 7A F2 CE CE