Date: Fri, 23 Feb 2001 08:43:43 -0500 (EST) From: Rob Simmons <rsimmons@wlcg.com> To: Kris Kennaway <kris@obsecurity.org> Cc: <freebsd-security@freebsd.org> Subject: Re: RIPEMD-160 Message-ID: <Pine.BSF.4.33.0102230831210.14765-100000@mail.wlcg.com> In-Reply-To: <20010222203526.A13606@mollari.cthul.hu>
next in thread | previous in thread | raw e-mail | index | archive | help
I figured, after looking at it that it would require some changes to the code. The reason I want to do this is for the multi-user boxes that I have. I would like to use a 160-bit algorithm that is not know to be insecure. Another reason is that most of the common password cracking programs support MD5, DES, etc. Confusing script kiddies is always fun. Robert Simmons Systems Administrator http://www.wlcg.com/ On Thu, 22 Feb 2001, Kris Kennaway wrote: > Well, it's of course not this simple - you would have to modify the > libcrypt code. But IMO there's no justification for doing this - MD5 > passwords aren't known to be insecure in any way. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.33.0102230831210.14765-100000>