From owner-freebsd-security@FreeBSD.ORG Fri Jun 8 15:04:21 2012 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 5CD89106566B for ; Fri, 8 Jun 2012 15:04:21 +0000 (UTC) (envelope-from feld@feld.me) Received: from feld.me (unknown [IPv6:2607:f4e0:100:300::2]) by mx1.freebsd.org (Postfix) with ESMTP id 238148FC16 for ; Fri, 8 Jun 2012 15:04:21 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=feld.me; s=blargle; h=In-Reply-To:Message-Id:From:Content-Transfer-Encoding:Mime-Version:Cc:Date:References:Subject:To:Content-Type; bh=8Z/xUWYnhSYz7N+p3pg7zX+EJygA0w1RiMTpA1Kl4Bc=; b=FY7RZbvB65xkR5ruotmroZQf6bX85drI0ugdAfrsRpYF/zXOVJvUhSp1gmOt4njlJoPShqIDr+CccHWwjs3QPU1wsfeBtZCak4xpqvUFGDB0VRBREKD6z8aaBzlVPH1n; Received: from localhost ([127.0.0.1] helo=mwi1.coffeenet.org) by feld.me with esmtp (Exim 4.77 (FreeBSD)) (envelope-from ) id 1Sd0jb-000F5z-Eh; Fri, 08 Jun 2012 10:04:20 -0500 Received: from feld@feld.me by mwi1.coffeenet.org (Archiveopteryx 3.1.4) with esmtpa id 1339167853-26372-26371/5/60; Fri, 8 Jun 2012 15:04:13 +0000 Content-Type: text/plain; charset=utf-8; format=flowed; delsp=yes To: freebsd-security@freebsd.org References: <86r4tqotjo.fsf@ds4.des.no> Date: Fri, 8 Jun 2012 10:04:12 -0500 Mime-Version: 1.0 Content-Transfer-Encoding: quoted-printable From: Mark Felder Message-Id: In-Reply-To: <86r4tqotjo.fsf@ds4.des.no> User-Agent: Opera Mail/11.64 (FreeBSD) X-SA-Score: -1.5 Cc: Dag-Erling =?ISO-8859-1?q?Sm=F8rgrav?= Subject: Re: Default password hash X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 08 Jun 2012 15:04:21 -0000 On Fri, 08 Jun 2012 07:51:55 -0500, Dag-Erling Sm=C3=B8rgrav = wrote: > We still have MD5 as our default password hash, even though known-hash > attacks against MD5 are relatively easy these days. We've supported > SHA256 and SHA512 for many years now, so how about making SHA512 the > default instead of MD5, like on most Linux distributions? > > Index: etc/login.conf > =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D > --- etc/login.conf (revision 236616) > +++ etc/login.conf (working copy) > @@ -23,7 +23,7 @@ > # AND SEMANTICS'' section of getcap(3) for more escape sequences). > > default:\ > - :passwd_format=3Dmd5:\ > + :passwd_format=3Dsha512:\ > :copyright=3D/etc/COPYRIGHT:\ > :welcome=3D/etc/motd:\ > :setenv=3DMAIL=3D/var/mail/$,BLOCKSIZE=3DK,FTP_PASSIVE_MODE=3DY= ES:\ > > DES I strongly support this -- using either SHA-2 or Blowfish would be a = great =20 step forward. You'll also want to change the defuault for auth.conf so =20 adduser picks it up. # # $FreeBSD: releng/9.0/etc/auth.conf 118103 2003-07-28 02:28:51Z rwatson = $ # # Configure some authentication-related defaults. This file is being # gradually subsumed by user class and PAM configuration. # # crypt_default =3D md5 des