Date: Sun, 2 May 1999 15:48:52 -0400 (EDT) From: Dug Song <dugsong@monkey.org> To: Eivind Eklund <eivind@FreeBSD.ORG> Cc: freebsd-security@FreeBSD.ORG Subject: Re: Blowfish/Twofish Message-ID: <Pine.BSF.4.03.9905021540081.10790-100000@funky.monkey.org> In-Reply-To: <19990502122142.A289@samurai.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Sun, May 02, 1999 at 06:16:47PM +0200, Eivind Eklund <eivind@FreeBSD.ORG> wrote: > > The point of this exercise would (IMO, at least) only be OpenBSD > compatibility, where OpenBSD for marketeering reasons has decided to > use Blowfish as part of their hash algorithm. marketeering? read the paper being presented by Niels Provos and David Mazieres at next month's USENIX (FREENIX track), and decide for yourself - "A Future-Adaptable Password Scheme": http://www.citi.umich.edu/u/provos/papers/bcrypt.ps.gz this could be rolled into pam_unix for FreeBSD, perhaps. -d. --- http://www.monkey.org/~dugsong/ To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.03.9905021540081.10790-100000>