Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 23 Jun 2012 16:09:42 +0200 (CEST)
From:      Wojciech Puchar <wojtek@wojtek.tensor.gdynia.pl>
To:        "Christopher J. Ruwe" <cjr@cruwe.de>
Cc:        freebsd-questions@freebsd.org
Subject:   Re: changing md5 hashed for sha
Message-ID:  <alpine.BSF.2.00.1206231608080.38992@wojtek.tensor.gdynia.pl>
In-Reply-To: <20120623155957.570eff66@dijkstra.cruwe.de>
References:  <20120623153710.36e7446f@dijkstra.cruwe.de> <alpine.BSF.2.00.1206231540400.38775@wojtek.tensor.gdynia.pl> <20120623155957.570eff66@dijkstra.cruwe.de>

next in thread | previous in thread | raw e-mail | index | archive | help
>>> been recommended changing md5 for something more secure in the
>>> sense of being more expensive to crack.
>>
>> is md5 that easy to crack?
>
> It has been discussed recently, cf
> http://lists.freebsd.org/pipermail/freebsd-security/2012-June/006271.html
> or virtually the first half of
> http://lists.freebsd.org/pipermail/freebsd-security/2012-June/thread.html
>
wasn't aware md5 is really risky. thanks.
anyway - as long as someone don't actually get /etc/master.passwd it 
doesn't matter, it could be even plaintext here.

If someone can get /etc/master.passwd then he/she most probably already 
got root priviledge :)



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?alpine.BSF.2.00.1206231608080.38992>