Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 21 Aug 2012 10:31:54 -0400
From:      Mike Tancsa <mike@sentex.net>
To:        freebsd-security@freebsd.org
Subject:   Re: Default password encryption method.
Message-ID:  <50339BDA.7080002@sentex.net>
In-Reply-To: <CAASvXNt7oT4g9YaNtMyheMkFyb_0ASfD-ErvCfJBRpuPqkrEwQ@mail.gmail.com>
References:  <CAASvXNt7oT4g9YaNtMyheMkFyb_0ASfD-ErvCfJBRpuPqkrEwQ@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On 6/19/2012 10:10 AM, ian ivy wrote:
> By default FreeBSD uses MD5 to encrypt passwords. MD5 is believed to be
> more secure than e.g. DES but less than e.g. SHA512. Currently several
> major Linux distributions, uses a SHA512 mechanism. Suse Linux also offers
> a blowfish.


A late followup to this thread, but there was a decent fleshed out
article on this issue

http://arstechnica.com/security/2012/08/passwords-under-assault/

There are a few caveats/clarifications in the comments, but pretty good
overall for a non hardcore crypto audience.


	---Mike



-- 
-------------------
Mike Tancsa, tel +1 519 651 3400
Sentex Communications, mike@sentex.net
Providing Internet services since 1994 www.sentex.net
Cambridge, Ontario Canada   http://www.tancsa.com/



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?50339BDA.7080002>