Gleb Kurtsou <gleb.kurt...@gmail.com> writes: > In other words, currently there is no benefit in switch default > algorithm to relatively new crypt_sha512 vs 256-iterations > crypt_blowfish supported on RELENG_7.
>From a cryptographic point of view, perhaps, but they are both better than the current default (md5), and all else being equal, I favor the option that maximises compatibility, i.e. sha512. DES -- Dag-Erling Smørgrav - d...@des.no _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"