Date: Fri, 7 Mar 2014 22:30:36 -0700 From: Warner Losh <imp@bsdimp.com> To: Allan Jude <freebsd@allanjude.com> Cc: nanoman@nanoman.ca, freebsd-current@freebsd.org, d@delphij.net, secteam@freebsd.org, =?windows-1252?Q?Dag-Erling_Sm=F8rgrav?= <des@des.no> Subject: Re: Feature Proposal: Transparent upgrade of crypt() algorithms Message-ID: <39EE68A1-E2F5-4373-BFC9-D1C3156B0056@gmail.com> In-Reply-To: <531AA900.6090406@allanjude.com> References: <2167732.JmQmEPMV2N@desktop.reztek> <201403070913.30359.jhb@freebsd.org> <5319DE84.3040602@allanjude.com> <20140307161313.GA49137@nanocomputer.nanoman.ca> <531A2CC1.8080802@allanjude.com> <20140307215223.GB49137@nanocomputer.nanoman.ca> <531A42F3.5020207@delphij.net> <531A4DE1.3070507@allanjude.com> <20140307230715.GA17019@funkthat.com> <531A67B4.1010303@delphij.net> <20140308021536.GB17019@funkthat.com> <531AA900.6090406@allanjude.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Mar 7, 2014, at 10:22 PM, Allan Jude <freebsd@allanjude.com> wrote: >> Performance for default, sha512 w/ 5k rounds: >> AMD A10-5700 3.4GHz 3.8ms >> AMD Opteron 4228 HE 2.8Ghz 5.4ms >> Intel(R) Xeon(R) X5650 2.67GHz 4.0ms >>=20 >> these times are aprox as the timing varies quite a bit, ~+/-10%=85 And what would that be on a RPi or other embedded device? And do the extra route have a peer-reviewed paper showing the increased = strength? > One possible solution would be just setting the default login.conf > number of rounds, based on a test in the installer. Although this = won't > help for systems that are deployed by imaging, or VM images (like EC2 > images) etc. I=92m not sure that=92s a good idea. Warner
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?39EE68A1-E2F5-4373-BFC9-D1C3156B0056>