Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sat, 9 Feb 2013 04:35:10 +0400
From: Solar Designer <solar@...nwall.com>
To: john-users@...ts.openwall.com
Subject: Re: SSHA-512 supported?

On Fri, Feb 08, 2013 at 05:25:02PM -0700, Stephen John Smoogen wrote:
> So from another set.. the number of rounds are powers of 2. So instead
> of 1000 they will be 1024
> http://www.pcclm.com/2013/02/increase-password-security-on-linux.html

This page only says that in bcrypt context (and SunMD5's default).

Anyhow, I've already tested all possible defaults in the 1000 to
50000 range, including 1024.  Is their default possibly lower than
sha512crypt's normal minimum of 1000?  Should test 1 to 999 then.

> $ pwdhash -s SSHA512 'colorado'
> {SSHA512}rgnHDUg4S7+WU6nu2PrEY9BRMsjw99QKudEPpUYblJtPk/laB1lz/mt5PXL12lXOGgTCW6MAWGmGlMHi07QIc9fZjndFHSUn

As you realize, this is irrelevant.

Alexander

Powered by blists - more mailing lists

Your e-mail address:

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.