Date: Mon, 17 Jun 2013 15:02:29 -0500 From: "Mark Felder" <feld@feld.me> To: "Teske, Devin" <Devin.Teske@fisglobal.com>, "Devin Teske" <dteske@freebsd.org> Cc: FreeBSD Questions <freebsd-questions@freebsd.org> Subject: Re: FreeBSD maximum password length Message-ID: <op.wyt9yfya34t2sn@tech304.office.supranet.net> In-Reply-To: <13CA24D6AB415D428143D44749F57D7201F93897@ltcfiswmsgmb21> References: <CAPkyVLw=m5-3HX7YC-Zqm=OgTLMhNYq4trBSWso8qEmPzqV38Q@mail.gmail.com> <44li69diyv.fsf@be-well.ilk.org> <CAPkyVLwNAUU_2E0d8Go6OP4m7jqHeHKCWEt5WRhtYcgRBSQ2nQ@mail.gmail.com> <20130617164744.1c4e3d02e57de825d500e309@yahoo.es> <13CA24D6AB415D428143D44749F57D7201F936C4@ltcfiswmsgmb21> <op.wyt2tgk934t2sn@tech304.office.supranet.net> <13CA24D6AB415D428143D44749F57D7201F93897@ltcfiswmsgmb21>
next in thread | previous in thread | raw e-mail | index | archive | help
On Mon, 17 Jun 2013 12:52:48 -0500, Teske, Devin <Devin.Teske@fisglobal.com> wrote: > Is sha512 the highest it goes in our system? Not sure what the limitations are. I know OpenBSD uses blowfish and I have been using that on older FreeBSD servers as a workaround. I think that OpenBSD uses a high number of rounds on their blowfish to make brute forces more difficult because of how slow it gets.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?op.wyt9yfya34t2sn>