From owner-freebsd-hackers Mon Oct 2 7:34:51 2000 Delivered-To: freebsd-hackers@freebsd.org Received: from mail2.netcologne.de (mail2.netcologne.de [194.8.194.103]) by hub.freebsd.org (Postfix) with ESMTP id DECDF37B503 for ; Mon, 2 Oct 2000 07:34:46 -0700 (PDT) Received: from bagabeedaboo.security.at12.de (dial-213-168-73-43.netcologne.de [213.168.73.43]) by mail2.netcologne.de (8.9.3/8.9.3) with ESMTP id QAA14897 for ; Mon, 2 Oct 2000 16:34:44 +0200 (MET DST) Received: from localhost (localhost.security.at12.de [127.0.0.1]) by bagabeedaboo.security.at12.de (8.11.0/8.11.0) with ESMTP id e92EYbl00913 for ; Mon, 2 Oct 2000 16:34:37 +0200 (CEST) (envelope-from pherman@frenchfries.net) Date: Mon, 2 Oct 2000 16:34:37 +0200 (CEST) From: Paul Herman To: hackers@FreeBSD.ORG Subject: Blowfish passwords Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-hackers@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG Hi, I've come up with a small patchset to libcrypt (ported from OpenBSD) which adds the blowfish password digest in addition to des and md5. Features include: * Compatibility with OpenBSD (for those of us using NIS) * switchable behavior in /etc/login.conf (passwd_format=bf) * ability to do multiple rounds on the fly, i.e. 2^x iterations 1