From owner-freebsd-questions Mon Oct 1 20:21:14 2001 Delivered-To: freebsd-questions@freebsd.org Received: from smtp017.mail.yahoo.com (smtp017.mail.yahoo.com [216.136.174.114]) by hub.freebsd.org (Postfix) with SMTP id E863137B410 for ; Mon, 1 Oct 2001 20:21:11 -0700 (PDT) Received: from unknown (HELO cheech.uchaswv.edu) (12.4.161.230) by smtp.mail.vip.sc5.yahoo.com with SMTP; 2 Oct 2001 03:21:11 -0000 X-Apparently-From: Date: Mon, 1 Oct 2001 23:29:41 -0400 From: Nathan Mace To: freebsd-questions Subject: shadow passwords Message-Id: <20011001232941.5db52eb7.nmace85@yahoo.com> X-Mailer: Sylpheed version 0.6.2 (GTK+ 1.2.10; i386--freebsd4.4) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: owner-freebsd-questions@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.ORG does freebsd support shadow passwords? also what can i do to make my passwords 'less' crackable in terms of someone taking a cracker and cracking them? in terms of making the stuff in the password files harder to figure out using brute force? an example would be is 'blowfish' ecryption harder to decrypt then md5 or whaever freebsd uses for default? i hope this question makes sense...if not i can try and clarify it. thanks nathan _________________________________________________________ Do You Yahoo!? Get your free @yahoo.com address at http://mail.yahoo.com To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message