From owner-freebsd-questions@FreeBSD.ORG Tue Aug 2 17:24:48 2011 Return-Path: Delivered-To: freebsd-questions@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 57E6C106564A for ; Tue, 2 Aug 2011 17:24:48 +0000 (UTC) (envelope-from tomdean@speakeasy.org) Received: from mail7.sea5.speakeasy.net (mail7.sea5.speakeasy.net [69.17.117.52]) by mx1.freebsd.org (Postfix) with ESMTP id 376F28FC0C for ; Tue, 2 Aug 2011 17:24:48 +0000 (UTC) Received: (qmail 19968 invoked from network); 2 Aug 2011 17:24:47 -0000 Received: from 24-113-112-30.wavecable.com (HELO [192.168.2.2]) (tomdean@[24.113.112.30]) (envelope-sender ) by mail7.sea5.speakeasy.net (qmail-ldap-1.03) with SMTP for ; 2 Aug 2011 17:24:47 -0000 From: "Thomas D. Dean" To: freebsd-questions@FreeBSD.org In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Organization: Home Date: Tue, 02 Aug 2011 10:24:47 -0700 Message-ID: <1312305887.2229.104.camel@asus> Mime-Version: 1.0 X-Mailer: Evolution 2.28.3 Content-Transfer-Encoding: 8bit Cc: Subject: Re: password hash weaknesses in FreeBSD ? X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list Reply-To: tomdean@speakeasy.org List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 02 Aug 2011 17:24:48 -0000 On Tue, 2011-08-02 at 17:36 +0100, マンロークリストファ wrote: > The crypt program to hash passwords uses md5 /DES/blowfish for > password hashing as I have read in the handbook. DES and md5 are > widely regarded to be broken (certainly DES). I would prefer password > hashing to be done using salted SHA1 / SHA256 to meet my security > needs. Is this configuration possible? > _______________________________________________ > freebsd-questions@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-questions > To unsubscribe, send any mail to "freebsd-questions-unsubscribe@freebsd.org" > http://www.bsdguides.org/guides/freebsd/security/harden.php google "freebsd password hash sha256" http://www.google.com/search?hl=en&q=freebsd+password+hash +sha256&aq=f&aqi=&aql=&oq= Has patches toward adding this. tomdean