Gleb Kurtsou <gleb.kurt...@gmail.com> writes:
> In other words, currently there is no benefit in switch default
> algorithm to relatively new crypt_sha512 vs 256-iterations
> crypt_blowfish supported on RELENG_7.

>From a cryptographic point of view, perhaps, but they are both better
than the current default (md5), and all else being equal, I favor the
option that maximises compatibility, i.e. sha512.

DES
-- 
Dag-Erling Smørgrav - d...@des.no
_______________________________________________
freebsd-security@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"

Reply via email to