Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20120805163948.37781cf1@newbook>
Date: Sun, 5 Aug 2012 16:39:48 -0700
From: Isaac Dunham <idunham@...abit.com>
To: musl@...ts.openwall.com
Subject: Re: musl 0.9.3 released

On Sun, 5 Aug 2012 01:22:20 -0400
Rich Felker <dalias@...ifal.cx> wrote:

> On Sun, Aug 05, 2012 at 12:56:24AM -0400, idunham@...abit.com wrote:
> > > On 08/05/2012 03:00 AM, idunham@...abit.com wrote:
> > >>
> > >>> I'd also like to finish and integrate the rest of rdp's porting
> > >>> work (mips64, ppc, and microblaze) and possibly get an x32
> > >>> (32-bit ABI on x86_64) port underway, and integrate additional
> > >>> hash function support (blowfish, sha, md5) for crypt.
> > >> All of these sound good.
> > ...In other words, if you or someone you are in
> > commmunication with is going to start using musl x32 for any reason
> > besides "It happens to be supported".
> 
> If I were going to switch to x86_64 cpu, which I will probably do in
> the next few years, x32 would certainly be appealing. Not decided for
> sure, but it seems very nice to get all the important benefits of a
> 64-bit cpu with none of the bloat. I think this sounds appealing to
> a big part of musl's target userbase too...

OK, that's what I was asking.


> > >> Something other than standard crypt (isn't that DES, which can be
> > >> cracked in a day on the right machine?) would be one of the more
> > >> interesting ones from my perspective.  Remembering the recent
> > >> test results, I'd be hoping for bcrypt as well (it's where OpenCL
> > >> cracking gets the least benefit).
> > > which test results are you referring to ?
> > 
> > best discussion:
> > http://openwall.info/wiki/john/GPU
> > http://openwall.info/wiki/john/GPU/bcrypt
<snip>

> > 4. This is "If you plan to add hashes (which Rich has stated
> > that he hopes to do, in the original post), please consider
> > making bcrypt one of them."
> 
> How bloated is it? Sadly crypto folks seem to love giant bloated
> tables...
Well, now that I look it up, bcrypt() is blowfish crypt() (at least,
it's the primary blowfish-based crypt()--it does have a few
peculiarities of its own)
It is somewhat expensive in terms of resources, per the results
mentioned.

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.