From owner-freebsd-security@FreeBSD.ORG Sat Jun 9 07:43:12 2012 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 234C2106564A; Sat, 9 Jun 2012 07:43:12 +0000 (UTC) (envelope-from ohartman@zedat.fu-berlin.de) Received: from outpost1.zedat.fu-berlin.de (outpost1.zedat.fu-berlin.de [130.133.4.66]) by mx1.freebsd.org (Postfix) with ESMTP id CA08B8FC08; Sat, 9 Jun 2012 07:43:11 +0000 (UTC) Received: from inpost2.zedat.fu-berlin.de ([130.133.4.69]) by outpost1.zedat.fu-berlin.de (Exim 4.69) with esmtp (envelope-from ) id <1SdGKE-0000qo-NU>; Sat, 09 Jun 2012 09:43:10 +0200 Received: from e178004171.adsl.alicedsl.de ([85.178.4.171] helo=thor.walstatt.dyndns.org) by inpost2.zedat.fu-berlin.de (Exim 4.69) with esmtpsa (envelope-from ) id <1SdGKE-0005i2-I4>; Sat, 09 Jun 2012 09:43:10 +0200 Message-ID: <4FD2FE87.1060708@zedat.fu-berlin.de> Date: Sat, 09 Jun 2012 09:43:03 +0200 From: "O. Hartmann" User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:12.0) Gecko/20120601 Thunderbird/12.0.1 MIME-Version: 1.0 To: =?UTF-8?B?RGFnLUVybGluZyBTbcO4cmdyYXY=?= References: <86r4tqotjo.fsf@ds4.des.no> In-Reply-To: <86r4tqotjo.fsf@ds4.des.no> X-Enigmail-Version: 1.4.2 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="------------enig7DD995A299773893EAE04524" X-Originating-IP: 85.178.4.171 Cc: freebsd-security@freebsd.org, "freebsd-cur >> Current FreeBSD" Subject: Re: Default password hash X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 09 Jun 2012 07:43:12 -0000 This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enig7DD995A299773893EAE04524 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable On 06/08/12 14:51, Dag-Erling Sm=C3=B8rgrav wrote: > We still have MD5 as our default password hash, even though known-hash > attacks against MD5 are relatively easy these days. We've supported > SHA256 and SHA512 for many years now, so how about making SHA512 the > default instead of MD5, like on most Linux distributions? >=20 > Index: etc/login.conf > =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D > --- etc/login.conf (revision 236616) > +++ etc/login.conf (working copy) > @@ -23,7 +23,7 @@ > # AND SEMANTICS'' section of getcap(3) for more escape sequences). >=20 > default:\ > - :passwd_format=3Dmd5:\ > + :passwd_format=3Dsha512:\ > :copyright=3D/etc/COPYRIGHT:\ > :welcome=3D/etc/motd:\ > :setenv=3DMAIL=3D/var/mail/$,BLOCKSIZE=3DK,FTP_PASSIVE_MODE=3DY= ES:\ >=20 > DES You should also file a PR for change-requets, so it is not only in the email list. I second a change, since I use "blf" since 2009 without (obvious) problems. The manpage for login.conf also needs an update. I checked this morning and found that thye manpage doesn't even mention hashes apart from des, md5 and blf. Oliver --------------enig7DD995A299773893EAE04524 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.19 (FreeBSD) iQEcBAEBAgAGBQJP0v6OAAoJEOgBcD7A/5N8cLsH/i3nLMA3KruJ1Jv0zx/vOI0t 4pRMVVuDQvoDXoBtbAgrv3pRBMJ/EdHhgd3giAw8MB16MBvN/JO5ilBZx3ox+nCm 7Jqa5Ga9hTLZmnYv7hBbQhDVSdikOVSlGYM2SGTOowxW6xDsiYnfrDyBPmFMEJ8j Mi3uLjH985yWlVls6qHzsnMhIRCt8J8KsxKdN6Fb2T2wz6v4ihy1x3V5JBPo1Tgu bWiT/DKEhzpgouiyhyR4F2GP25qJZawDn6Pbt99eSpUwuCTPxqH/WEm7shxxS7+1 064zF8RHi3mPuhqjtIjoJCz+v3+qTyWYWWe++7tGu/zsshRkN7T8j77lwe3Jejs= =Veyv -----END PGP SIGNATURE----- --------------enig7DD995A299773893EAE04524--