Re: Feature Proposal: Transparent upgrade of crypt() algorithms

看板FB_current作者時間11年前 (2014/03/08 13:32), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串25/27 (看更多)
On Mar 7, 2014, at 10:22 PM, Allan Jude <freebsd@allanjude.com> wrote: >> Performance for default, sha512 w/ 5k rounds: >> AMD A10-5700 3.4GHz 3.8ms >> AMD Opteron 4228 HE 2.8Ghz 5.4ms >> Intel(R) Xeon(R) X5650 2.67GHz 4.0ms >> = >> these times are aprox as the timing varies quite a bit, ~+/-10%=85 And what would that be on a RPi or other embedded device? And do the extra route have a peer-reviewed paper showing the increased str= ength? > One possible solution would be just setting the default login.conf > number of rounds, based on a test in the installer. Although this won't > help for systems that are deployed by imaging, or VM images (like EC2 > images) etc. I=92m not sure that=92s a good idea. Warner _______________________________________________ freebsd-current@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-current To unsubscribe, send any mail to "freebsd-current-unsubscribe@freebsd.org"
文章代碼(AID): #1J6gjICV (FB_current)
討論串 (同標題文章)
完整討論串 (本文為第 25 之 27 篇):
文章代碼(AID): #1J6gjICV (FB_current)