From owner-freebsd-security Fri Feb 14 23:03:13 1997 Return-Path: Received: (from root@localhost) by freefall.freebsd.org (8.8.5/8.8.5) id XAA05383 for security-outgoing; Fri, 14 Feb 1997 23:03:13 -0800 (PST) Received: from bofh.cybercity.dk (bofh.cybercity.dk [195.8.128.254]) by freefall.freebsd.org (8.8.5/8.8.5) with ESMTP id XAA05373 for ; Fri, 14 Feb 1997 23:03:06 -0800 (PST) Received: from critter.dk.tfs.com (phk.cybercity.dk [195.8.133.247]) by bofh.cybercity.dk (8.8.3/8.7.3) with ESMTP id IAA25743; Sat, 15 Feb 1997 08:05:43 +0100 (MET) Received: from critter.dk.tfs.com (localhost [127.0.0.1]) by critter.dk.tfs.com (8.8.2/8.8.2) with ESMTP id IAA11873; Sat, 15 Feb 1997 08:04:54 +0100 (MET) To: proff@suburbia.net cc: mal@bengt.algonet.se (Mats Lofkvist), security@FreeBSD.ORG Subject: Re: blowfish passwords in FreeBSD In-reply-to: Your message of "Sat, 15 Feb 1997 13:12:45 +1100." <19970215021245.1798.qmail@suburbia.net> Date: Sat, 15 Feb 1997 08:04:54 +0100 Message-ID: <11871.855990294@critter.dk.tfs.com> From: Poul-Henning Kamp Sender: owner-security@FreeBSD.ORG X-Loop: FreeBSD.org Precedence: bulk In message <19970215021245.1798.qmail@suburbia.net>, proff@suburbia.net writes: >> Why did they feel the need for something better than md5? >> Is there any known weaknesses in md5? 128 bits is enough to make md5 >> extremely secure until someone finds a serious flaw in the algorithm, >> brute force attacks will probably never be a problem. > >Further, md5 as a signature algorithm is exportable, while blowfish is >not. md5 does have some flaws, but not in this context. Theo belives he can export anything just because he is in Canada. -- Poul-Henning Kamp | phk@FreeBSD.ORG FreeBSD Core-team. http://www.freebsd.org/~phk | phk@login.dknet.dk Private mailbox. whois: [PHK] | phk@tfs.com TRW Financial Systems, Inc. Power and ignorance is a disgusting cocktail.