Date: Thu, 28 Jan 2010 21:29:59 +0100 From: Antoine Brodin <antoine@FreeBSD.org> To: Chris Palmer <chris@noncombatant.org> Cc: freebsd-security@freebsd.org Subject: Re: PHK's MD5 might not be slow enough anymore Message-ID: <f19c444a1001281229yc17a897qf55fe64aa4711410@mail.gmail.com> In-Reply-To: <20100128201857.GP892@noncombatant.org> References: <20100128182413.GI892@noncombatant.org> <20100128135410.7b6fe154.wmoran@collaborativefusion.com> <20100128193941.GK892@noncombatant.org> <20100128151026.5738b6c1.wmoran@collaborativefusion.com> <20100128201857.GP892@noncombatant.org>
index | next in thread | previous in thread | raw e-mail
On Thu, Jan 28, 2010 at 9:18 PM, Chris Palmer <chris@noncombatant.org> wrote: > For backwards compatibility, which do people prefer: Creating a new $N$ > prefix every time we re-tune the algorithm, or using a new notation to say > how many times this password was hashed? For example: $1.1000$, $1.100000$, > et c.? You may want to have a look at http://people.redhat.com/drepper/SHA-crypt.txt and freebsd PR 124164. Cheers, Antoinehelp
Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?f19c444a1001281229yc17a897qf55fe64aa4711410>
