From owner-freebsd-security Sat Feb 15 08:11:36 1997 Return-Path: Received: (from root@localhost) by freefall.freebsd.org (8.8.5/8.8.5) id IAA00331 for security-outgoing; Sat, 15 Feb 1997 08:11:36 -0800 (PST) Received: from ocean.campus.luth.se (ocean.campus.luth.se [130.240.194.116]) by freefall.freebsd.org (8.8.5/8.8.5) with ESMTP id IAA00325 for ; Sat, 15 Feb 1997 08:11:31 -0800 (PST) Received: (from karpen@localhost) by ocean.campus.luth.se (8.7.5/8.7.3) id RAA04441; Sat, 15 Feb 1997 17:12:45 +0100 (MET) From: Mikael Karpberg Message-Id: <199702151612.RAA04441@ocean.campus.luth.se> Subject: Re: blowfish passwords in FreeBSD To: imp@village.org (Warner Losh) Date: Sat, 15 Feb 1997 17:12:44 +0100 (MET) Cc: lithium@cia-g.com, security@freebsd.org In-Reply-To: from Warner Losh at "Feb 15, 97 08:09:17 am" X-Mailer: ELM [version 2.4ME+ PL22 (25)] MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: owner-security@freebsd.org X-Loop: FreeBSD.org Precedence: bulk According to Warner Losh: > Stephen Fisher writes: > : Where has this been used before though? MD5 and especially DES have been > : time proven and tested and white papers have been written, and people have > : studied them to death already. > > I don't have the references. > > However, reports have come in that brute force has cracked 40 and 48 > bit keys in less than a month. Next stop 56 bit keys :-). Try http://www.42.org/challenge/ :-) /Mikael