From owner-cvs-all Mon Jun 21 15:21:34 1999 Delivered-To: cvs-all@freebsd.org Received: from wall.polstra.com (rtrwan160.accessone.com [206.213.115.74]) by hub.freebsd.org (Postfix) with ESMTP id C1CAC14F39; Mon, 21 Jun 1999 15:21:29 -0700 (PDT) (envelope-from jdp@polstra.com) Received: from vashon.polstra.com (vashon.polstra.com [206.213.73.13]) by wall.polstra.com (8.9.3/8.9.1) with ESMTP id PAA12400; Mon, 21 Jun 1999 15:21:28 -0700 (PDT) (envelope-from jdp@polstra.com) Received: (from jdp@localhost) by vashon.polstra.com (8.9.3/8.9.1) id PAA03095; Mon, 21 Jun 1999 15:21:27 -0700 (PDT) (envelope-from jdp@polstra.com) Message-ID: X-Mailer: XFMail 1.3 [p0] on FreeBSD X-Priority: 3 (Normal) Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 8bit MIME-Version: 1.0 In-Reply-To: Date: Mon, 21 Jun 1999 15:21:27 -0700 (PDT) Organization: Polstra & Co., Inc. From: John Polstra To: "Brian F. Feldman" Subject: Re: cvs commit: ports/security/cfs Makefile Cc: cvs-all@FreeBSD.org, cvs-committers@FreeBSD.org, John Polstra Sender: owner-cvs-all@FreeBSD.ORG Precedence: bulk Brian F. Feldman wrote: > How about making Blowfish the default encryption scheme in cmkdir? It's entirely possible that you know 10 times more about cfs than I do. Wanna become the maintainer? ;-) If the default encryption were changed, would it lose its ability to decrypt existing files? At least is there a command line option for the server to overcome that? I'm not opposed to changing the default, as long as it doesn't leave existing users stranded with undecryptable files. John --- John Polstra jdp@polstra.com John D. Polstra & Co., Inc. Seattle, Washington USA "Self-interest is the aphrodisiac of belief." -- James V. DeLong To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe cvs-all" in the body of the message