Rob D. posted a link to a page that describes problems with MD5, a hashing algorithm.
3 Replies to “MD5 secrets”
Meh. It’s not such a big problem. It’s trivially easy to get both FreeBSD and DragonFly to use blowfish instead. I wish it were the default though, as it would save a very small amount of work on a fresh install.
OT: Wishlist of minor things to see as defaults in DragonFly:
* Blowfish passwords instead of MD5
* Encrypted swap out of the box (AES?)
* Sound drivers built into the kernel
* Oh, and pkgsrc (stupid aging FreeBSD ports)
That’s my rant for the day ;^)
I guess I should write how to do it…
edit /etc/login.conf
change passwd_format=md5
to
passwd_format=blf
save the file, then do:
cap_mkdb /etc/login.conf
Then edit /etc/auth.conf to contain the following:
crypt_default = blf
Don’t forget to “renew” the passwords.
Encrypted swap and encrypted home dirs would be great indeed.
Meh. It’s not such a big problem. It’s trivially easy to get both FreeBSD and DragonFly to use blowfish instead. I wish it were the default though, as it would save a very small amount of work on a fresh install.
OT: Wishlist of minor things to see as defaults in DragonFly:
* Blowfish passwords instead of MD5
* Encrypted swap out of the box (AES?)
* Sound drivers built into the kernel
* Oh, and pkgsrc (stupid aging FreeBSD ports)
That’s my rant for the day ;^)
I guess I should write how to do it…
edit /etc/login.conf
change passwd_format=md5
to
passwd_format=blf
save the file, then do:
cap_mkdb /etc/login.conf
Then edit /etc/auth.conf to contain the following:
crypt_default = blf
Don’t forget to “renew” the passwords.
Encrypted swap and encrypted home dirs would be great indeed.