Date: Sun, 9 Jun 2002 03:07:00 -0700 (PDT) From: <phk@FreeBSD.org> To: freebsd@spatula.net, phk@FreeBSD.org, freebsd-bugs@FreeBSD.org Subject: Re: bin/39037: crypt-md5 may prematurely drop a source of entropy Message-ID: <200206091007.g59A70d90788@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
Synopsis: crypt-md5 may prematurely drop a source of entropy State-Changed-From-To: open->closed State-Changed-By: phk State-Changed-When: Sun Jun 9 03:04:08 PDT 2002 State-Changed-Why: Well, what can I say ? I usually don't attain perfection, neither in first nor last attempt :-) Yes, there are certain things in the md5crypt which should have been thought better out. The piece of code you point out is just one example. There have actually been a couple of revisions run over in OpenBSD, I've seen $2$ and $2a$ passwords already. http://www.freebsd.org/cgi/query-pr.cgi?pr=39037 To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200206091007.g59A70d90788>
