Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 28 Jan 2010 12:18:57 -0800
From:      Chris Palmer <chris@noncombatant.org>
To:        freebsd-security@freebsd.org
Subject:   Re: PHK's MD5 might not be slow enough anymore
Message-ID:  <20100128201857.GP892@noncombatant.org>
In-Reply-To: <20100128151026.5738b6c1.wmoran@collaborativefusion.com>
References:  <20100128182413.GI892@noncombatant.org> <20100128135410.7b6fe154.wmoran@collaborativefusion.com> <20100128193941.GK892@noncombatant.org> <20100128151026.5738b6c1.wmoran@collaborativefusion.com>

next in thread | previous in thread | raw e-mail | index | archive | help

For backwards compatibility, which do people prefer: Creating a new $N$
prefix every time we re-tune the algorithm, or using a new notation to say
how many times this password was hashed? For example: $1.1000$, $1.100000$,
et c.?

I prefer the latter. It can work with Blowfish, too, and anything else
people come up with in the future.




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20100128201857.GP892>