Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 2 Aug 2011 17:36:12 +0100
From:      =?ISO-2022-JP?B?GyRCJV4lcyVtITwlLyVqJTklSCVVJSEbKEI=?= <xoreax63@gmail.com>
To:        freebsd-questions@FreeBSD.org
Subject:   password hash weaknesses in FreeBSD ?
Message-ID:  <CAHKe%2BWJ_8GK-5bYzTMWParYENUF00SrZGj12mmLm9c6rPN-uqg@mail.gmail.com>

next in thread | raw e-mail | index | archive | help
The crypt program to hash passwords uses md5 /DES/blowfish for
password hashing as I have read in the handbook. DES and md5 are
widely regarded to be broken (certainly DES). I would prefer password
hashing to be done using salted SHA1 / SHA256 to meet my security
needs. Is this configuration possible?



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAHKe%2BWJ_8GK-5bYzTMWParYENUF00SrZGj12mmLm9c6rPN-uqg>