On Sun, 2012-07-15 at 11:32 -0700, Robin wrote:
> Indeed. What I have seen is a create deal of variation in the > configuration (/etc/login.defs or your distro's equivalent) in terms of > making use of such things. > > I don't see any added value to bcrypt over iterated SHA-512, really, and bcrypt and scrypt are password hash's - they are designed to be slow md5/sha/sha2 are cryptographic hash's - they are designed to be fast However, if you keep your database secure, yes, this means using competent coders, then it matters little what method you use. Of course if you allow system access to users, the strongest is better than nothing.
signature.asc
Description: This is a digitally signed message part