Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 8 Jun 2012 09:06:12 -0400
From:      Maxim Khitrov <max@mxcrypt.com>
To:        =?UTF-8?Q?Dag=2DErling_Sm=C3=B8rgrav?= <des@des.no>
Cc:        freebsd-security@freebsd.org
Subject:   Re: Default password hash
Message-ID:  <CAJcQMWdMp-ATdTzq6CNcy6dAUzZ98w2snT=u_cM=qLvQznAn_w@mail.gmail.com>
In-Reply-To: <86r4tqotjo.fsf@ds4.des.no>
References:  <86r4tqotjo.fsf@ds4.des.no>

next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, Jun 8, 2012 at 8:51 AM, Dag-Erling Sm=C3=B8rgrav <des@des.no> wrote=
:
> We still have MD5 as our default password hash, even though known-hash
> attacks against MD5 are relatively easy these days. =C2=A0We've supported
> SHA256 and SHA512 for many years now, so how about making SHA512 the
> default instead of MD5, like on most Linux distributions?

If SHA-2 hashes have been supported for many years, why haven't the
man pages been updated? login.conf(5) on 9.0-RELEASE still only lists
"des", "md5", and "blf". I've been using the latter on my systems.

- Max



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAJcQMWdMp-ATdTzq6CNcy6dAUzZ98w2snT=u_cM=qLvQznAn_w>