From owner-freebsd-security Mon Feb 17 13:59:40 1997 Return-Path: Received: (from root@localhost) by freefall.freebsd.org (8.8.5/8.8.5) id NAA18371 for security-outgoing; Mon, 17 Feb 1997 13:59:40 -0800 (PST) Received: from sneezy.sri.com (sneezy.sri.com [128.18.40.6]) by freefall.freebsd.org (8.8.5/8.8.5) with SMTP id NAA18364 for ; Mon, 17 Feb 1997 13:59:35 -0800 (PST) Received: from swift.rmlnet by sneezy.sri.com (SMI-8.6/SMI-SVR4) id NAA21983; Mon, 17 Feb 1997 13:56:58 -0800 Received: by swift.rmlnet (SMI-8.6/SMI-SVR4) id NAA25999; Mon, 17 Feb 1997 13:59:43 -0800 Date: Mon, 17 Feb 1997 13:59:43 -0800 Message-Id: <199702172159.NAA25999@swift.rmlnet> From: Nate Williams To: Adam Shostack Cc: mal@bengt.algonet.se (Mats Lofkvist), freebsd-security@freebsd.org Subject: Re: blowfish passwords in FreeBSD In-Reply-To: <199702142347.SAA18988@homeport.org> References: <199702142048.VAA08594@bengt> <199702142347.SAA18988@homeport.org> Sender: owner-security@freebsd.org X-Loop: FreeBSD.org Precedence: bulk > Its also worth noting that hashes are designed to be one way > functions, ciphers like Blowfish are not. Though they can be > converted back and forth, there can be subtilties that should be > addressed. If so, then we can't export BlowFish (legally) from the U.S. Nate