Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 19 Jun 2012 16:10:06 +0200
From:      ian ivy <sidetripping@gmail.com>
To:        freebsd-security@freebsd.org
Subject:   Default password encryption method.
Message-ID:  <CAASvXNt7oT4g9YaNtMyheMkFyb_0ASfD-ErvCfJBRpuPqkrEwQ@mail.gmail.com>

next in thread | raw e-mail | index | archive | help
Hello,

By default FreeBSD uses MD5 to encrypt passwords. MD5 is believed to be
more secure than e.g. DES but less than e.g. SHA512. Currently several
major Linux distributions, uses a SHA512 mechanism. Suse Linux also offers
a blowfish.

Some Debian based distributions use MD5-based algorithm compatible with the
one
used by recent releases of FreeBSD - but mostly this variable (*
MD5_CRYPT_ENAB*)
is deprecated, and SHA512-based algorithm is used.

Of course, in FreeBSD we can change the MD5 for example to BLF,
but, it will be not a better solution to use SHA512 by default?



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAASvXNt7oT4g9YaNtMyheMkFyb_0ASfD-ErvCfJBRpuPqkrEwQ>