Date: Fri, 22 Mar 2013 00:06:14 GMT From: Olivier Cochard-Labbe <olivier@cochard.me> To: freebsd-gnats-submit@FreeBSD.org Subject: docs/177215: FreeBSD uses SHA512 and no more MD5 for encrypting passwords Message-ID: <201303220006.r2M06E44089818@red.freebsd.org> Resent-Message-ID: <201303220010.r2M0A0QI009061@freefall.freebsd.org>
index | next in thread | raw e-mail
>Number: 177215
>Category: docs
>Synopsis: FreeBSD uses SHA512 and no more MD5 for encrypting passwords
>Confidential: no
>Severity: non-critical
>Priority: low
>Responsible: freebsd-doc
>State: open
>Quarter:
>Keywords:
>Date-Required:
>Class: doc-bug
>Submitter-Id: current-users
>Arrival-Date: Fri Mar 22 00:10:00 UTC 2013
>Closed-Date:
>Last-Modified:
>Originator: Olivier Cochard-Labbe
>Release: 9.1-RELEASE
>Organization:
BSD Router Project
>Environment:
FreeBSD laptop.bsdrp.net 9.1-RELEASE FreeBSD 9.1-RELEASE #0 r243825: Tue Dec 4 09:23:10 UTC 2012 root@farrell.cse.buffalo.edu:/usr/obj/usr/src/sys/GENERIC amd64
>Description:
FreeBSD 9.1 uses SHA512 and not MD5 for encrypting passwords.
But chapter 15.4.1 "Recognizing Your Crypt Mechanism" still indicate MD5.
>How-To-Repeat:
>Fix:
Applying the patch.
Patch attached with submission follows:
--- en_US.ISO8859-1/books/handbook/security/chapter.xml.orig 2013-03-22 00:57:02.000000000 +0100
+++ en_US.ISO8859-1/books/handbook/security/chapter.xml 2013-03-22 00:59:23.000000000 +0100
@@ -1084,7 +1084,7 @@
<title>Recognizing Your Crypt Mechanism</title>
<para>Currently the library supports DES, MD5, Blowfish, SHA256,
- and SHA512 hash functions. By default &os; uses MD5 to
+ and SHA512 hash functions. By default &os; uses SHA512 to
encrypt passwords.</para>
<para>It is pretty easy to identify which encryption method &os;
>Release-Note:
>Audit-Trail:
>Unformatted:
home |
help
Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201303220006.r2M06E44089818>
