Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 11 Jun 2012 16:58:47 +0200
From:      =?utf-8?Q?Dag-Erling_Sm=C3=B8rgrav?= <des@des.no>
To:        Mike Tancsa <mike@sentex.net>
Cc:        freebsd-security@freebsd.org
Subject:   Re: Default password hash
Message-ID:  <863961opy0.fsf@ds4.des.no>
In-Reply-To: <4FD5FCB3.80000@sentex.net> (Mike Tancsa's message of "Mon, 11 Jun 2012 10:12:03 -0400")
References:  <86r4tqotjo.fsf@ds4.des.no> <4FD334BE.4020900@sentex.net> <86ipeyp73q.fsf@ds4.des.no> <4FD5CF47.7070800@sentex.net> <867gvene35.fsf@ds4.des.no> <4FD5FCB3.80000@sentex.net>

next in thread | previous in thread | raw e-mail | index | archive | help
Mike Tancsa <mike@sentex.net> writes:
> Locally, we still have a need to share some passwd files between a
> couple of RELENG_8 and RELENG_7 boxes.  But it might be better to just
> upgrade the new boxes to 8 if need be.  If not, is Blowfish as its
> currently implemented on RELENG_7 considered strong enough ? There has
> been some discussion suggesting its not and some that it is.

I'm build-testing a backport of the sha2 code to 7 as we speak.

I vastly prefer sha512 to blf, as that is what the rest of the world
uses.

DES
--=20
Dag-Erling Sm=C3=B8rgrav - des@des.no



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?863961opy0.fsf>