From owner-freebsd-questions@FreeBSD.ORG Mon Jun 17 20:02:56 2013 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by hub.freebsd.org (Postfix) with ESMTP id 79555222; Mon, 17 Jun 2013 20:02:56 +0000 (UTC) (envelope-from feld@feld.me) Received: from out4-smtp.messagingengine.com (out4-smtp.messagingengine.com [66.111.4.28]) by mx1.freebsd.org (Postfix) with ESMTP id 493071C92; Mon, 17 Jun 2013 20:02:55 +0000 (UTC) Received: from compute3.internal (compute3.nyi.mail.srv.osa [10.202.2.43]) by gateway1.nyi.mail.srv.osa (Postfix) with ESMTP id BEF3D217AD; Mon, 17 Jun 2013 16:02:36 -0400 (EDT) Received: from frontend1.nyi.mail.srv.osa ([10.202.2.160]) by compute3.internal (MEProxy); Mon, 17 Jun 2013 16:02:53 -0400 DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=feld.me; h= content-type:to:cc:subject:references:date:mime-version :content-transfer-encoding:from:message-id:in-reply-to; s= mesmtp; bh=OKq7lL8oujN5Y5sTR/9ZRz3tVBU=; b=DoRWq9tQppyWid9XOz0LB N1dcAMiZg5YRlsecc+p+mVflIr9HjFN7Gn1ck8Purv1kYbcDE2JgaXVhPZSOUaqQ PU9WE9xp4iCHLk9FY2JDeH901mUDhTmIutNq/YC2fS+ojxTzn8OM5CvueubroLyo g/y6amsXQ1rgrK5JpvJ9IA= DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d= messagingengine.com; h=content-type:to:cc:subject:references :date:mime-version:content-transfer-encoding:from:message-id :in-reply-to; s=smtpout; bh=OKq7lL8oujN5Y5sTR/9ZRz3tVBU=; b=UFIE FJvvINWZO7n6gsps1GEEQZ8yBUACv7roG1SsI4rK/LZIU3M51TjCcUdw2sjgljiD BQI4ZRv/rx6wYYq608v9tioYYS4lwsQgUpHT3ISBtGG0sheLAemIfpF4q32BnlEy 07+FqqB/YtJIFgFhELIHOvZzO28RxhxABehv8k4= X-Sasl-enc: +bvyXwRToMP0OySjDxH5KndXNcnh2Q2/r324CwePRbPQ 1371499350 Received: from tech304.office.supranet.net (unknown [66.170.8.18]) by mail.messagingengine.com (Postfix) with ESMTPA id 34E97C00E93; Mon, 17 Jun 2013 16:02:30 -0400 (EDT) Content-Type: text/plain; charset=us-ascii; format=flowed; delsp=yes To: "Teske, Devin" , "Devin Teske" Subject: Re: FreeBSD maximum password length References: <44li69diyv.fsf@be-well.ilk.org> <20130617164744.1c4e3d02e57de825d500e309@yahoo.es> <13CA24D6AB415D428143D44749F57D7201F936C4@ltcfiswmsgmb21> <13CA24D6AB415D428143D44749F57D7201F93897@ltcfiswmsgmb21> Date: Mon, 17 Jun 2013 15:02:29 -0500 MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: "Mark Felder" Message-ID: In-Reply-To: <13CA24D6AB415D428143D44749F57D7201F93897@ltcfiswmsgmb21> User-Agent: Opera Mail/12.15 (FreeBSD) Cc: FreeBSD Questions X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 17 Jun 2013 20:02:56 -0000 On Mon, 17 Jun 2013 12:52:48 -0500, Teske, Devin wrote: > Is sha512 the highest it goes in our system? Not sure what the limitations are. I know OpenBSD uses blowfish and I have been using that on older FreeBSD servers as a workaround. I think that OpenBSD uses a high number of rounds on their blowfish to make brute forces more difficult because of how slow it gets.