From mboxrd@z Thu Jan 1 00:00:00 1970 X-Msuck: nntp://news.gmane.org/gmane.linux.lib.musl.general/1402 Path: news.gmane.org!not-for-mail From: idunham@lavabit.com Newsgroups: gmane.linux.lib.musl.general Subject: Re: musl 0.9.3 released Date: Sun, 5 Aug 2012 00:56:24 -0400 (EDT) Message-ID: <40178.50.0.229.11.1344142584.squirrel@lavabit.com> References: <20120803023633.GG544@brightrain.aerifal.cx> <9251.50.0.229.11.1344128449.squirrel@lavabit.com> <501DEF70.6060900@barfooze.de> Reply-To: musl@lists.openwall.com NNTP-Posting-Host: plane.gmane.org Mime-Version: 1.0 Content-Type: text/plain;charset=iso-8859-1 Content-Transfer-Encoding: 8bit X-Trace: dough.gmane.org 1344142597 15485 80.91.229.3 (5 Aug 2012 04:56:37 GMT) X-Complaints-To: usenet@dough.gmane.org NNTP-Posting-Date: Sun, 5 Aug 2012 04:56:37 +0000 (UTC) To: musl@lists.openwall.com Original-X-From: musl-return-1403-gllmg-musl=m.gmane.org@lists.openwall.com Sun Aug 05 06:56:37 2012 Return-path: Envelope-to: gllmg-musl@plane.gmane.org Original-Received: from mother.openwall.net ([195.42.179.200]) by plane.gmane.org with smtp (Exim 4.69) (envelope-from ) id 1SxstI-00018r-Q3 for gllmg-musl@plane.gmane.org; Sun, 05 Aug 2012 06:56:36 +0200 Original-Received: (qmail 31793 invoked by uid 550); 5 Aug 2012 04:56:36 -0000 Mailing-List: contact musl-help@lists.openwall.com; run by ezmlm Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: Original-Received: (qmail 31785 invoked from network); 5 Aug 2012 04:56:35 -0000 DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=lavabit; d=lavabit.com; b=M0sHWmUwco0LB+sExFVFSEfJ0lQjLq7r4Zik7d++thhVaSZnW62Xa0Skx9jGDlJhF3z5dM13/oY6NwfSsWi4n84Wk/z2jf2Jb6Srv8J+KrtDfY0xepfxlrN5R0sfkq/Kl4FuGLlXwjxqEUwTJDGHREpb544SV/jAfc8dkUTQoOw=; h=Message-ID:In-Reply-To:References:Date:Subject:From:To:User-Agent:MIME-Version:Content-Type:Content-Transfer-Encoding; In-Reply-To: <501DEF70.6060900@barfooze.de> User-Agent: SquirrelMail/1.4.13 Xref: news.gmane.org gmane.linux.lib.musl.general:1402 Archived-At: > On 08/05/2012 03:00 AM, idunham@lavabit.com wrote: >> >>> I'd also like to finish and integrate the rest of rdp's porting work >>> (mips64, ppc, and microblaze) and possibly get an x32 (32-bit ABI on >>> x86_64) port underway, and integrate additional hash function support >>> (blowfish, sha, md5) for crypt. >> All of these sound good. >> I'm not sure about whether many people would be interested in x32, >> though?... > x32 is the latest hype and a lot of work has recently been put into > toolchain, kernel and debugger support. > this is probably a good opportunity to get the attention of early > adopters. Well, actually, a lot of work has recently been _finished_, so glibc/binutils/kernel/... now have stable support. Early adopters have been using it for a year or few. The adoption has been rather minimal as far as I can tell; what I meant to ask was more if any current/potential users of musl intend to use it if possible. In other words, if you or someone you are in commmunication with is going to start using musl x32 for any reason besides "It happens to be supported". >> Something other than standard crypt (isn't that DES, which can be >> cracked in a day on the right machine?) would be one of the more >> interesting ones from my perspective. Remembering the recent test >> results, I'd be hoping for bcrypt as well (it's where OpenCL >> cracking gets the least benefit). > which test results are you referring to ? best discussion: http://openwall.info/wiki/john/GPU http://openwall.info/wiki/john/GPU/bcrypt There are several other articles you can find, if you look up john the ripper gpu hash bcrypt (or anything reasonably similar...) > for my part, i think simple DES crypt() in the libc is sufficient. > busybox 1.20+ ships with a decent set of hash algos to use for login, so > the libc crypt code isnt used anyway 1. Is busybox the only login we want to support? 2. Is login (or similar) the only place crypt is used? 3. Do we want to rely on the busybox internal code? 4. This is "If you plan to add hashes (which Rich has stated that he hopes to do, in the original post), please consider making bcrypt one of them." Isaac Dunham