From owner-freebsd-hackers Fri Jun 2 17:27:43 1995 Return-Path: hackers-owner Received: (from majordom@localhost) by freefall.cdrom.com (8.6.10/8.6.6) id RAA05292 for hackers-outgoing; Fri, 2 Jun 1995 17:27:43 -0700 Received: from ref.tfs.com (ref.tfs.com [140.145.254.251]) by freefall.cdrom.com (8.6.10/8.6.6) with ESMTP id RAA05286 for ; Fri, 2 Jun 1995 17:27:43 -0700 Received: (from phk@localhost) by ref.tfs.com (8.6.8/8.6.6) id RAA10434; Fri, 2 Jun 1995 17:27:29 -0700 From: Poul-Henning Kamp Message-Id: <199506030027.RAA10434@ref.tfs.com> Subject: Re: UNIX crypt() source - the problem solved (fwd) To: peter@bonkers.taronga.com (Peter da Silva) Date: Fri, 2 Jun 1995 17:27:29 -0700 (PDT) Cc: hackers@freebsd.org In-Reply-To: <199506030000.TAA12776@bonkers.taronga.com> from "Peter da Silva" at Jun 2, 95 07:00:03 pm Content-Type: text Content-Length: 395 Sender: hackers-owner@freebsd.org Precedence: bulk > > >From comp.security... a possible solution to the secdist problem. I would say > if this is kosher keep md for better security and this crypt for compatibility. I presume you know that freebsd 2.0 did this ? -- Poul-Henning Kamp -- TRW Financial Systems, Inc. 'All relevant people are pertinent' && 'All rude people are impertinent' => 'no rude people are relevant'