Re: Default password hash

看板FB_security作者時間13年前 (2012/06/12 02:01), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串45/47 (看更多)
On 6/11/2012 10:00 AM, Dag-Erling Sm繪rgrav wrote: > Mike Tancsa <mike@sentex.net> writes: >> Dag-Erling Sm繪rgrav <des@des.no> writes: >>> Mike Tancsa <mike@sentex.net> writes: >>>> Actually, any chance of MFC'ing SHA256 and 512 in RELENG_7 ? Its >>>> currently not there. >>> "not there" as in "not supported by crypt(3)"? >> If you put in sha256|sha512 in passwd_format, the passwd that gets >> chosen is DES, as in Data Encryption Standard, not Dag-Erling Sm繪rgrav >> ;-) > > This is non-trivial to fix, as the code that would need to be MFCed > depends on libc changes. I'm worried about collateral damage from > MFCing those changes. > > It may be possible to backport the sha2 code. Locally, we still have a need to share some passwd files between a couple of RELENG_8 and RELENG_7 boxes. But it might be better to just upgrade the new boxes to 8 if need be. If not, is Blowfish as its currently implemented on RELENG_7 considered strong enough ? There has been some discussion suggesting its not and some that it is. ---Mike -- ------------------- Mike Tancsa, tel +1 519 651 3400 Sentex Communications, mike@sentex.net Providing Internet services since 1994 www.sentex.net Cambridge, Ontario Canada http://www.tancsa.com/ _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
文章代碼(AID): #1FrZ9VM2 (FB_security)
討論串 (同標題文章)
文章代碼(AID): #1FrZ9VM2 (FB_security)