Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 28 Jan 2010 21:29:59 +0100
From:      Antoine Brodin <antoine@FreeBSD.org>
To:        Chris Palmer <chris@noncombatant.org>
Cc:        freebsd-security@freebsd.org
Subject:   Re: PHK's MD5 might not be slow enough anymore
Message-ID:  <f19c444a1001281229yc17a897qf55fe64aa4711410@mail.gmail.com>
In-Reply-To: <20100128201857.GP892@noncombatant.org>
References:  <20100128182413.GI892@noncombatant.org> <20100128135410.7b6fe154.wmoran@collaborativefusion.com> <20100128193941.GK892@noncombatant.org> <20100128151026.5738b6c1.wmoran@collaborativefusion.com> <20100128201857.GP892@noncombatant.org>

index | next in thread | previous in thread | raw e-mail

On Thu, Jan 28, 2010 at 9:18 PM, Chris Palmer <chris@noncombatant.org> wrote:
> For backwards compatibility, which do people prefer: Creating a new $N$
> prefix every time we re-tune the algorithm, or using a new notation to say
> how many times this password was hashed? For example: $1.1000$, $1.100000$,
> et c.?

You may want to have a look at
http://people.redhat.com/drepper/SHA-crypt.txt and freebsd PR 124164.

Cheers,

Antoine


help

Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?f19c444a1001281229yc17a897qf55fe64aa4711410>