Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 26 Jul 1996 20:32:34 +0200
From:      Poul-Henning Kamp <phk@critter.tfs.com>
To:        Nathan Lawson <nlawson@kdat.csc.calpoly.edu>
Cc:        freebsd-security@freebsd.org
Subject:   Re: Crack 4.1 patches for FBSD 
Message-ID:  <2867.838405954@critter.tfs.com>
In-Reply-To: Your message of "Fri, 26 Jul 1996 07:27:37 PDT." <199607261427.HAA02418@kdat.calpoly.edu> 

next in thread | previous in thread | raw e-mail | index | archive | help
>> Any news on any attacks on our MD5 based passwords ?
>
>The only problem I see with them is that MD5 is so darn quick, your number
>of crypts goes way up even with the present number of iterations.  The DES
>hash used in most Unicen was desigend to be slow (originally taking 1 second
>per crypt on a VAX 11/780), but that fell prey to optimization and exponential
>CPU speed increases.
>
>Perhaps some intermediate permutations between hashes might be appropriate,
>but I'd consider the algorithm very carefully as it is very easy to end up
>with something that is no slower than the original and significantly less
>secure.

Have you actually timed them ?  Have you actually looked at the code that
generates the MD5 passwords in FreeBSD ?  It sounds to me like you havn't...

--
Poul-Henning Kamp           | phk@FreeBSD.ORG       FreeBSD Core-team.
http://www.freebsd.org/~phk | phk@login.dknet.dk    Private mailbox.
whois: [PHK]                | phk@ref.tfs.com       TRW Financial Systems, Inc.
Future will arrive by its own means, progress not so.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?2867.838405954>