Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 29 Jan 2010 00:33:25 +0100
From:      Dan Lukes <dan@obluda.cz>
To:        Mike Andrews <mandrews@bit0.com>
Cc:        freebsd-security@freebsd.org
Subject:   Re: PHK's MD5 might not be slow enough anymore
Message-ID:  <4B621EC5.3030400@obluda.cz>
In-Reply-To: <alpine.BSF.2.00.1001281738110.43056@beast.int.bit0.com>
References:  <20100128182413.GI892@noncombatant.org>	<20100128135410.7b6fe154.wmoran@collaborativefusion.com>	<20100128193941.GK892@noncombatant.org>	<20100128151026.5738b6c1.wmoran@collaborativefusion.com>	<20100128201857.GP892@noncombatant.org> <4B620DAC.4080608@bit0.com> <alpine.BSF.2.00.1001281738110.43056@beast.int.bit0.com>

next in thread | previous in thread | raw e-mail | index | archive | help

On 01/28/10 23:44, Mike Andrews:
>> all my password hashes are in the format "$2a$04$salthash" -- with the "04"
>> being the (default) number of rounds of Blowfish to run

> There is probably a login.conf knob to raise the default number of
> rounds beyond 2^4.

No. The standard way of password change flow trough pam_unix.c.

It call crypt(new_pass, salt) where salt is pseudo-random sequence. As 
such salt doesn't start with a magic, the default algorithm is selected. 
If it si blowfish, then crypt_blowfish(key, salt) is called.

As the random salt doesn't start with $2a$ magic it is not considered to 
be '$2a$nn$salt'-like string. Then default number (04) is used all the 
times.

						Dan



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4B621EC5.3030400>