From owner-freebsd-hackers Fri Mar 2 9:50:21 2001 Delivered-To: freebsd-hackers@freebsd.org Received: from mr200.netcologne.de (mr200.netcologne.de [194.8.194.109]) by hub.freebsd.org (Postfix) with ESMTP id C999237B71A for ; Fri, 2 Mar 2001 09:50:17 -0800 (PST) (envelope-from pherman@frenchfries.net) Received: from husten.security.at12.de (dial-213-168-73-58.netcologne.de [213.168.73.58]) by mr200.netcologne.de (Mirapoint) with ESMTP id ACA22821; Fri, 2 Mar 2001 18:50:14 +0100 (CET) Received: from localhost (localhost.security.at12.de [127.0.0.1]) by husten.security.at12.de (8.11.2/8.11.2) with ESMTP id f22HnxE65557; Fri, 2 Mar 2001 18:49:59 +0100 (CET) (envelope-from pherman@frenchfries.net) Date: Fri, 2 Mar 2001 18:49:59 +0100 (CET) From: Paul Herman To: milunovic Cc: Peter Pentchev , Subject: Re: blow fish In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-hackers@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG On Fri, 2 Mar 2001, milunovic wrote: > Does anybody have blow fish for FreeBSD or know wehere to find it? > I just want to change password encription from MD5 to blow fish:o) I think Mark Murray is still sitting on the patch I did for this very thing. Check the -hackers mail archives. It was about 2-3 Months ago, so it may not even patch cleanly anymore against -CURRENT. As for why, I can only think of two reasons. One, the geek factor (it has an iteration parameter built into the hash to "increase" security on the fly, it's pretty trick), but mostly two, for people using NIS between OpenBSD and FreeBSD boxen. I don't use it (it was just a fun little hacking project), so I personally don't care if it gets worked into the tree, but this has got to be the 3rd or 4th time somebody has asked for it. -Paul. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message