Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 17 Jun 2013 15:02:29 -0500
From:      "Mark Felder" <feld@feld.me>
To:        "Teske, Devin" <Devin.Teske@fisglobal.com>, "Devin Teske" <dteske@freebsd.org>
Cc:        FreeBSD Questions <freebsd-questions@freebsd.org>
Subject:   Re: FreeBSD maximum password length
Message-ID:  <op.wyt9yfya34t2sn@tech304.office.supranet.net>
In-Reply-To: <13CA24D6AB415D428143D44749F57D7201F93897@ltcfiswmsgmb21>
References:  <CAPkyVLw=m5-3HX7YC-Zqm=OgTLMhNYq4trBSWso8qEmPzqV38Q@mail.gmail.com> <44li69diyv.fsf@be-well.ilk.org> <CAPkyVLwNAUU_2E0d8Go6OP4m7jqHeHKCWEt5WRhtYcgRBSQ2nQ@mail.gmail.com> <20130617164744.1c4e3d02e57de825d500e309@yahoo.es> <13CA24D6AB415D428143D44749F57D7201F936C4@ltcfiswmsgmb21> <op.wyt2tgk934t2sn@tech304.office.supranet.net> <13CA24D6AB415D428143D44749F57D7201F93897@ltcfiswmsgmb21>

next in thread | previous in thread | raw e-mail | index | archive | help
On Mon, 17 Jun 2013 12:52:48 -0500, Teske, Devin  
<Devin.Teske@fisglobal.com> wrote:

> Is sha512 the highest it goes in our system?

Not sure what the limitations are. I know OpenBSD uses blowfish and I have  
been using that on older FreeBSD servers as a workaround. I think that  
OpenBSD uses a high number of rounds on their blowfish to make brute  
forces more difficult because of how slow it gets.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?op.wyt9yfya34t2sn>