Date: Sat, 23 Jun 2012 16:09:42 +0200 (CEST) From: Wojciech Puchar <wojtek@wojtek.tensor.gdynia.pl> To: "Christopher J. Ruwe" <cjr@cruwe.de> Cc: freebsd-questions@freebsd.org Subject: Re: changing md5 hashed for sha Message-ID: <alpine.BSF.2.00.1206231608080.38992@wojtek.tensor.gdynia.pl> In-Reply-To: <20120623155957.570eff66@dijkstra.cruwe.de> References: <20120623153710.36e7446f@dijkstra.cruwe.de> <alpine.BSF.2.00.1206231540400.38775@wojtek.tensor.gdynia.pl> <20120623155957.570eff66@dijkstra.cruwe.de>
next in thread | previous in thread | raw e-mail | index | archive | help
>>> been recommended changing md5 for something more secure in the >>> sense of being more expensive to crack. >> >> is md5 that easy to crack? > > It has been discussed recently, cf > http://lists.freebsd.org/pipermail/freebsd-security/2012-June/006271.html > or virtually the first half of > http://lists.freebsd.org/pipermail/freebsd-security/2012-June/thread.html > wasn't aware md5 is really risky. thanks. anyway - as long as someone don't actually get /etc/master.passwd it doesn't matter, it could be even plaintext here. If someone can get /etc/master.passwd then he/she most probably already got root priviledge :)
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?alpine.BSF.2.00.1206231608080.38992>