From owner-freebsd-security@FreeBSD.ORG Mon Jun 11 00:03:48 2012 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [69.147.83.52]) by hub.freebsd.org (Postfix) with ESMTP id 93D88106566B for ; Mon, 11 Jun 2012 00:03:48 +0000 (UTC) (envelope-from oliver.pntr@gmail.com) Received: from mail-gg0-f182.google.com (mail-gg0-f182.google.com [209.85.161.182]) by mx1.freebsd.org (Postfix) with ESMTP id 4E5798FC08 for ; Mon, 11 Jun 2012 00:03:48 +0000 (UTC) Received: by ggnm2 with SMTP id m2so2406481ggn.13 for ; Sun, 10 Jun 2012 17:03:42 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=uYroG0E91hlkpNKKNVMME+uWbuGO9Q7i50jhtKl/+sU=; b=xvXbubur3LN2SSbJL9aK6mtBtTrfyZhjDG953XrouYrR7btoXhw50HtxEMoFh8lX63 y9635YI+pSvjj6oEiKpWyhbQdejM/BaOUa4wLKmU7gilLN22zFVlu1q5ABXrmx93zk1/ OkKeDl5YR8TIeA5+MVto2yPI2BDkSYHXiE5CpTWqPft1ABmPchehXNIobAAYLj/WsRfe 4IwRAy9hNCel9DE2Gl+YE2zPWb1ho4Qv4++G6lb5AiIvaU5a4xJ5RX4QmLjHETgdM7XO uZxpM3Yiq8GxQ5BDQ2mJFamGerF3p48dijzpwj6xg5Z5CV1lUurGIAtQDiZcqd8iNEgi qOgg== MIME-Version: 1.0 Received: by 10.236.114.169 with SMTP id c29mr17880769yhh.108.1339373022469; Sun, 10 Jun 2012 17:03:42 -0700 (PDT) Received: by 10.236.46.233 with HTTP; Sun, 10 Jun 2012 17:03:42 -0700 (PDT) In-Reply-To: <20120611002402.088b2f74@gumby.homeunix.com> References: <20120611002402.088b2f74@gumby.homeunix.com> Date: Mon, 11 Jun 2012 02:03:42 +0200 Message-ID: From: Oliver Pinter To: RW Content-Type: text/plain; charset=ISO-8859-1 Cc: freebsd-security@freebsd.org Subject: Re: blf uses only 2^4 round for passwd encoding?! [Re: Default password hash] X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 11 Jun 2012 00:03:48 -0000 On 6/11/12, RW wrote: > On Mon, 11 Jun 2012 00:37:30 +0200 > Oliver Pinter wrote: > > >> 16 rounds in 2012? It is not to weak?! > > It's hard to say. Remember that blowfish was designed as a cipher not > a hash. It's designed to be fast, but to still resist known plaintext > attacks at the beginning of the ciphertext. It was also designed to > work directly with a passphrase because there was a history of > programmers abusing DES by using simple ascii passwords as keys. > > For these reasons initialization is deliberately expensive, > effectively it already contains an element of passphrase hashing. Yes, I know that the blowfish is a cipher and not hash, but I think 16 round today is too small. I checked this in a freshly installed openbsd, and they used 256 round ($2a$08$...) . > _______________________________________________ > freebsd-security@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-security > To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org" >