Could the people who work with distros confirm this default choice or suggest 
what they use please?


Thanks,

Pauli
-- 
Dr Paul Dale | Distinguished Architect | Cryptographic Foundations 
Phone +61 7 3031 7217
Oracle Australia




> On 18 Jan 2020, at 10:05 am, Dr Paul Dale <paul.d...@oracle.com> wrote:
> 
> I’ve made the deprecation changes to the password application.
> 
> The default has been changed from crypt to the BSD MD5 algorithm.
> 
> Pauli
> -- 
> Dr Paul Dale | Distinguished Architect | Cryptographic Foundations 
> Phone +61 7 3031 7217
> Oracle Australia
> 
> 
> 
> 
>> On 18 Jan 2020, at 9:27 am, Dr Paul Dale <paul.d...@oracle.com 
>> <mailto:paul.d...@oracle.com>> wrote:
>> 
>> Okay, it looks like the consensus is option 3 — deprecate and forget.
>> 
>> As far as I can tell, they are only used (by us) in one place outside of 
>> libcrypto, so that will deprecate as well.
>> 
>> 
>> Pauli
>> -- 
>> Dr Paul Dale | Distinguished Architect | Cryptographic Foundations 
>> Phone +61 7 3031 7217
>> Oracle Australia
>> 
>> 
>> 
>> 
>>> On 18 Jan 2020, at 6:53 am, Richard Levitte <levi...@openssl.org 
>>> <mailto:levi...@openssl.org>> wrote:
>>> 
>>> Right. Such a KDF could be implemented elsewhere, as a separate project.
>>> 
>>> Cheers
>>> Richard
>>> 
>>> 
>>> Kurt Roeckx <k...@roeckx.be <mailto:k...@roeckx.be>> skrev: (17 januari 
>>> 2020 21:35:00 CET)
>>>> On Fri, Jan 17, 2020 at 04:31:06PM +1000, Dr Paul Dale wrote:
>>>>> I’ve got several choices:
>>>>> Leave them public and unchanged — that is, don’t deprecate these two
>>>> functions yet.
>>>>> Deprecate them and add KDFs to replace them.
>>>>> Deprecate them, leave them alone and hope they go away painlessly at
>>>> some point.
>>>> 
>>>> I really see no point in adding something that we at the same time
>>>> would like to remove. Just deprecate it.
>>>> 
>>>> 
>>>> Kurt
>>> 
>>> -- 
>>> Richard by mobile
>> 
> 

Reply via email to