From owner-freebsd-security Sat Feb 15 09:36:11 1997 Return-Path: Received: (from root@localhost) by freefall.freebsd.org (8.8.5/8.8.5) id JAA06153 for security-outgoing; Sat, 15 Feb 1997 09:36:11 -0800 (PST) Received: from horst.bfd.com (horst.bfd.com [204.160.242.10]) by freefall.freebsd.org (8.8.5/8.8.5) with ESMTP id JAA06145 for ; Sat, 15 Feb 1997 09:36:03 -0800 (PST) Received: from harlie (bastion.bfd.com [204.160.242.14]) by horst.bfd.com (8.8.5/8.7.3) with SMTP id JAA03733; Sat, 15 Feb 1997 09:33:19 -0800 (PST) Date: Sat, 15 Feb 1997 09:33:18 -0800 (PST) From: "Eric J. Schwertfeger" X-Sender: ejs@harlie To: Warner Losh cc: Stephen Fisher , security@freebsd.org Subject: Re: blowfish passwords in FreeBSD In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-security@freebsd.org X-Loop: FreeBSD.org Precedence: bulk On Sat, 15 Feb 1997, Warner Losh wrote: > However, reports have come in that brute force has cracked 40 and 48 > bit keys in less than a month. Next stop 56 bit keys :-). 4 hours and 13 days, if I remember correctly, If you're referring to RSA's contest (challenge? They HAD to know that it would be broken).