
oss-sec mailing list archives
Re: weird crypt-sha* in DragonFly BSD
From: "Samuel J. Greear" <sjg () thesjg com>
Date: Fri, 20 Jan 2012 12:52:26 -0700
2. Instead of:+ * The deprecated sha256/512 functions are somehow sensitive to the + * order of this crypt_types array as well as their respective "name" members. + * + * In order to ensure that both existing passwords will continue to work and + * that new passwords will be more secure by using the new algorithms even + * without updating the existing login.conf, this array is now scanned + * backwards. This could be reverted in the future when the deprecated SHA + * functionality is removed. how about using the more reliable approach proposed by magnum here? - http://www.openwall.com/lists/john-dev/2012/01/19/1 As you can see, he has even spent time to identify the specific 64-bit magic values. Of course, you'll need to double-check them (such as by applying the patch and testing logins to existing accounts with both sha256 and sha512 on a 64-bit DragonFly system.)There isn't a collision issue with $3$ and $4$ on DragonFly, so I don't see any obvious need. I intend to rip the old code out after a few releases, so the issue (if there is one) will be (relatively) short lived.
We just realized that we obviously need to do this. Thanks again, Sam
Current thread:
- Re: weird crypt-sha* in DragonFly BSD Solar Designer (Jan 01)
- <Possible follow-ups>
- Re: weird crypt-sha* in DragonFly BSD Solar Designer (Jan 16)
- Re: weird crypt-sha* in DragonFly BSD Solar Designer (Jan 19)
- Re: weird crypt-sha* in DragonFly BSD Solar Designer (Jan 20)
- Re: weird crypt-sha* in DragonFly BSD Samuel J. Greear (Jan 20)
- Re: weird crypt-sha* in DragonFly BSD Samuel J. Greear (Jan 20)
- Re: weird crypt-sha* in DragonFly BSD Solar Designer (Jan 20)
- Re: weird crypt-sha* in DragonFly BSD Solar Designer (Jan 21)
- Re: weird crypt-sha* in DragonFly BSD Solar Designer (Jan 19)