-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 01/23/2012 12:59 PM, Kevin Chadwick wrote: > OpenBSDs bcrypt with configurable rounds is awesome by the way and far > more secure, yet wouldn't pass PCI compliance, how dumb some of these > certifications are.
I know next to nothing about bcrypt, but you can configure rounds in pam too: password required pam_unix.so sha512 shadow nullok rounds=999999 -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.18 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iQEcBAEBAgAGBQJPHU39AAoJEEDINPnaM7l+/UYH/11e5JPq2CE5yWTsNfcDFa67 R6YOJppkE+de4kYedkx0WOg6zTZ1GwQohbrFYJU7XPhNqQCGM0z5Q5bRbBJQbQee bdUJcVjtpwEFFk6+F86/ArW0N3+MLRB+v5eebzzE86JFCtES1op44sJadtsDlqgE QZFCPnKn7Pz3FxLgxW2k0jJAxA7VyLX3MgMUCgTmpqcYfq7OibFTQ+4nMQhVwmVK eUbb5Tw6DCwKG0qJrBInsEfP/nScrYd2Wew2kYmei1tVpy1LfddfJYWYuKc1sXz3 WQHKfbQ31Dp8ZhgehXdH7x3+Yuw+nmUsNpnrlBMD0RekZGvZt6wYKpkqF1xsE3M= =bXbX -----END PGP SIGNATURE-----