Re: Feature Proposal: Transparent upgrade of crypt() algorithms
On Mar 7, 2014, at 10:22 PM, Allan Jude <freebsd@allanjude.com> wrote:
>> Performance for default, sha512 w/ 5k rounds:
>> AMD A10-5700 3.4GHz 3.8ms
>> AMD Opteron 4228 HE 2.8Ghz 5.4ms
>> Intel(R) Xeon(R) X5650 2.67GHz 4.0ms
>> =
>> these times are aprox as the timing varies quite a bit, ~+/-10%=85
And what would that be on a RPi or other embedded device?
And do the extra route have a peer-reviewed paper showing the increased str=
ength?
> One possible solution would be just setting the default login.conf
> number of rounds, based on a test in the installer. Although this won't
> help for systems that are deployed by imaging, or VM images (like EC2
> images) etc.
I=92m not sure that=92s a good idea.
Warner
_______________________________________________
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscribe@freebsd.org"
討論串 (同標題文章)
完整討論串 (本文為第 25 之 27 篇):