Re: PHK's MD5 might not be slow enough anymore

看板FB_security作者時間16年前 (2010/02/01 21:32), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串28/35 (看更多)
Dan Lukes <dan@obluda.cz> writes: > Mike Andrews <mandrews@bit0.com> writes: > > There is probably a login.conf knob to raise the default number of > > rounds beyond 2^4. > No. The standard way of password change flow trough pam_unix.c. > > It call crypt(new_pass, salt) where salt is pseudo-random sequence. As > such salt doesn't start with a magic, the default algorithm is > selected. If it si blowfish, then crypt_blowfish(key, salt) is called. Mike is mostly right and you are mostly wrong. The default algorithm is indeed controlled by login.conf and auth.conf, although there is no way to specify the number of rounds. DES --=20 Dag-Erling Sm=C3=B8rgrav - des@des.no _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
文章代碼(AID): #1BPjVK3N (FB_security)
討論串 (同標題文章)
文章代碼(AID): #1BPjVK3N (FB_security)