Default password hash
Dag-Erling Smørgrav
des at des.no
Mon Jun 11 16:32:56 UTC 2012
Gleb Kurtsou <gleb.kurtsou at gmail.com> writes:
> In other words, currently there is no benefit in switch default
> algorithm to relatively new crypt_sha512 vs 256-iterations
> crypt_blowfish supported on RELENG_7.
>From a cryptographic point of view, perhaps, but they are both better
than the current default (md5), and all else being equal, I favor the
option that maximises compatibility, i.e. sha512.
DES
--
Dag-Erling Smørgrav - des at des.no
More information about the freebsd-security
mailing list