From owner-freebsd-hackers Fri Mar 2 4:32: 5 2001 Delivered-To: freebsd-hackers@freebsd.org Received: from ringworld.nanolink.com (ringworld.nanolink.com [195.24.48.13]) by hub.freebsd.org (Postfix) with SMTP id DAEB037B719 for ; Fri, 2 Mar 2001 04:32:01 -0800 (PST) (envelope-from roam@orbitel.bg) Received: (qmail 2814 invoked by uid 1000); 2 Mar 2001 12:31:41 -0000 Date: Fri, 2 Mar 2001 14:31:41 +0200 From: Peter Pentchev To: milunovic Cc: hackers@freebsd.org Subject: Re: blow fish Message-ID: <20010302143141.B2609@ringworld.oblivion.bg> Mail-Followup-To: milunovic , hackers@freebsd.org References: <20010302142603.A2609@ringworld.oblivion.bg> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.2.5i In-Reply-To: <20010302142603.A2609@ringworld.oblivion.bg>; from roam@orbitel.bg on Fri, Mar 02, 2001 at 02:26:03PM +0200 Sender: owner-freebsd-hackers@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG On Fri, Mar 02, 2001 at 02:26:03PM +0200, Peter Pentchev wrote: > On Fri, Mar 02, 2001 at 01:23:01PM +0100, milunovic wrote: > > > > Does anybody have blow fish for FreeBSD or know wehere to find it? > > I just want to change password encription from MD5 to blow fish:o) > > A little question: why? MD5 seems to be secure enough. > > Other than that, look at the security/libmcrypt port, it has Blowfish > as an available encryption algorithm. It's not in a usable form for > password encryption, though; you need to pull out the guts of the > encryption function and build your own crypt() function. Come to think of it, there's nothing that would prevent security/libmcrypt to be part of the authentication process (not crypt(), though). Is there something inherently flawed in the idea of a PAM module using libs which do not live in /usr, but in /usr/local? G'luck, Peter -- If I had finished this sentence, To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message