New submission from Serhiy Storchaka <storchaka+cpyt...@gmail.com>:

Proposed PR adds support of three new methods in the crypt module.

1. Blowfish. It is considered as strong as SSH512 for crypt() purpose. There 
are several variants of this method: '2', '2a', '2b' and '2y'. '2y' looks the 
same as '2b', other variants have different flaws. All four are supported on 
FreeBSD. '2b' is the only method available on OpenBSD, hence this change also 
fixes crypt on OpenBSD (see issue25287). Blowfish is not supported in glibc, 
but it is added in some Linux distributions (not in Ubuntu). The most strong of 
the available variants is chosen.

2. Extended DES. In contrary to traditional default algorithm it uses salt 
longer than 2 characters. It is supported on FreeBSD.

3. NT-Hash. It doesn't use salt and is compatible with Microsoft's NT scheme. 
It is supported on FreeBSD.

mksalt() now takes the log_rounds argument for Blowfish. I'm not sure this is 
the best solution. And what should be a default value?

----------
messages: 303516
nosy: serhiy.storchaka
priority: normal
severity: normal
status: open
title: Add support of new crypt methods

_______________________________________
Python tracker <rep...@bugs.python.org>
<https://bugs.python.org/issue31664>
_______________________________________
_______________________________________________
Python-bugs-list mailing list
Unsubscribe: 
https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com

Reply via email to