Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 2 May 1999 15:48:52 -0400 (EDT)
From:      Dug Song <dugsong@monkey.org>
To:        Eivind Eklund <eivind@FreeBSD.ORG>
Cc:        freebsd-security@FreeBSD.ORG
Subject:   Re: Blowfish/Twofish
Message-ID:  <Pine.BSF.4.03.9905021540081.10790-100000@funky.monkey.org>
In-Reply-To: <19990502122142.A289@samurai.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Sun, May 02, 1999 at 06:16:47PM +0200, Eivind Eklund <eivind@FreeBSD.ORG> wrote:
> 
> The point of this exercise would (IMO, at least) only be OpenBSD
> compatibility, where OpenBSD for marketeering reasons has decided to
> use Blowfish as part of their hash algorithm.

marketeering? read the paper being presented by Niels Provos and David
Mazieres at next month's USENIX (FREENIX track), and decide for yourself -
"A Future-Adaptable Password Scheme":

	http://www.citi.umich.edu/u/provos/papers/bcrypt.ps.gz

this could be rolled into pam_unix for FreeBSD, perhaps.

-d.

---
http://www.monkey.org/~dugsong/



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.03.9905021540081.10790-100000>