Date: Mon, 11 Jun 2012 16:58:47 +0200 From: =?utf-8?Q?Dag-Erling_Sm=C3=B8rgrav?= <des@des.no> To: Mike Tancsa <mike@sentex.net> Cc: freebsd-security@freebsd.org Subject: Re: Default password hash Message-ID: <863961opy0.fsf@ds4.des.no> In-Reply-To: <4FD5FCB3.80000@sentex.net> (Mike Tancsa's message of "Mon, 11 Jun 2012 10:12:03 -0400") References: <86r4tqotjo.fsf@ds4.des.no> <4FD334BE.4020900@sentex.net> <86ipeyp73q.fsf@ds4.des.no> <4FD5CF47.7070800@sentex.net> <867gvene35.fsf@ds4.des.no> <4FD5FCB3.80000@sentex.net>
next in thread | previous in thread | raw e-mail | index | archive | help
Mike Tancsa <mike@sentex.net> writes: > Locally, we still have a need to share some passwd files between a > couple of RELENG_8 and RELENG_7 boxes. But it might be better to just > upgrade the new boxes to 8 if need be. If not, is Blowfish as its > currently implemented on RELENG_7 considered strong enough ? There has > been some discussion suggesting its not and some that it is. I'm build-testing a backport of the sha2 code to 7 as we speak. I vastly prefer sha512 to blf, as that is what the rest of the world uses. DES --=20 Dag-Erling Sm=C3=B8rgrav - des@des.no
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?863961opy0.fsf>