From owner-freebsd-security@FreeBSD.ORG Fri Jun 8 16:47:14 2012 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [69.147.83.52]) by hub.freebsd.org (Postfix) with ESMTP id 2983B1065675 for ; Fri, 8 Jun 2012 16:47:14 +0000 (UTC) (envelope-from rwmaillists@googlemail.com) Received: from mail-ey0-f182.google.com (mail-ey0-f182.google.com [209.85.215.182]) by mx1.freebsd.org (Postfix) with ESMTP id A895B8FC1C for ; Fri, 8 Jun 2012 16:47:13 +0000 (UTC) Received: by eaac13 with SMTP id c13so1492024eaa.13 for ; Fri, 08 Jun 2012 09:47:12 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=googlemail.com; s=20120113; h=date:from:to:subject:message-id:in-reply-to:references:x-mailer :mime-version:content-type:content-transfer-encoding; bh=DL/L5Bs/bLZ+pObPyRRwNF2huMYFWobn2z5JgyPu8SI=; b=hTSaJZV1+393+N2MxRbWvzRuFZ50DpwhDoEtiRDqXqM/v86wSVXoL8XRZ568MBNQ5N Il4iWEfc5f8hThdEd0VpjuB8qWmkiEb3EzawkvIY4nGrHNEnbZjG5jAoO6X7+W2ZD72y woYZalypPrfs8cSPS597WrCh15KAdOe9RBzrkgjHnzaAosrTuPIP/FcTJy6FK/j1DpbZ RgVr//uabfoEifQSxNGY4EiaDHzyrubckwEU2SFDqI+/7ZAU/rslF9f30E3kgqwmifPr Q2/7tHS5Nwq0VShoGF5krdBI7SKwugfilUSJGojVNmktZ/tyrpK7Ib0Fne6sK+mFGWMB sMhg== Received: by 10.14.47.3 with SMTP id s3mr4206304eeb.127.1339174032542; Fri, 08 Jun 2012 09:47:12 -0700 (PDT) Received: from gumby.homeunix.com (87-194-105-247.bethere.co.uk. [87.194.105.247]) by mx.google.com with ESMTPS id c51sm24103844eei.12.2012.06.08.09.47.10 (version=SSLv3 cipher=OTHER); Fri, 08 Jun 2012 09:47:10 -0700 (PDT) Date: Fri, 8 Jun 2012 17:47:08 +0100 From: RW To: freebsd-security@freebsd.org Message-ID: <20120608174708.65bc90db@gumby.homeunix.com> In-Reply-To: <86r4tqotjo.fsf@ds4.des.no> References: <86r4tqotjo.fsf@ds4.des.no> X-Mailer: Claws Mail 3.8.0 (GTK+ 2.24.6; amd64-portbld-freebsd8.3) Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable Subject: Re: Default password hash X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 08 Jun 2012 16:47:14 -0000 On Fri, 08 Jun 2012 14:51:55 +0200 Dag-Erling Sm=F8rgrav wrote: > We still have MD5 as our default password hash, even though known-hash > attacks against MD5 are relatively easy these days. =20 Are any of those attacks relevant to salted passwords even with a single MD5 hash, let alone FreeBSD's complicated iterative algorithm?=20 =20 > We've supported SHA256 and SHA512 for many years now, so how about > making SHA512 the default instead of MD5, like on most Linux > distributions? I think the most important consideration is which is most resistant to brute force dictionary attack with GPUs. From a quick look at the code SHA512 looks to have 5000 rounds compared to MD5's 1000, but it's not so easy to compare with Blowfish.=20