From owner-freebsd-security Thu Feb 13 22:59:04 1997 Return-Path: Received: (from root@localhost) by freefall.freebsd.org (8.8.5/8.8.5) id WAA12509 for security-outgoing; Thu, 13 Feb 1997 22:59:04 -0800 (PST) Received: from agora.rdrop.com (root@agora.rdrop.com [199.2.210.241]) by freefall.freebsd.org (8.8.5/8.8.5) with SMTP id WAA12493 for ; Thu, 13 Feb 1997 22:59:01 -0800 (PST) Received: from rover.village.org by agora.rdrop.com with smtp (Smail3.1.29.1 #17) id m0vvHbi-00092AC; Thu, 13 Feb 97 22:58 PST Received: from rover.village.org [127.0.0.1] by rover.village.org with esmtp (Exim 0.56 #1) id E0vvHbl-00026f-00; Thu, 13 Feb 1997 23:58:57 -0700 To: security@freebsd.org Subject: blowfish passwords in FreeBSD Date: Thu, 13 Feb 1997 23:58:56 -0700 From: Warner Losh Message-Id: Sender: owner-security@freebsd.org X-Loop: FreeBSD.org Precedence: bulk OpenBSD just committed a new encryption method using blowfish. This has a much larger salt space as well as a much harder to break encryption scheme. Preliminary indications are that it looks really good. They implemented this much like md5, but with its own code. I think we should bring this into FreeBSD. What do others think? Warner